— Sensor deployments may be static, but researchers have recently been making a case for mobile collector nodes to enhance data acquisition. Since mobile nodes are often more pri...
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
This paper considers the current efforts to describe the effect of Internet-based technology on interactivity between citizens and public organizations to be incomplete and poorly...
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...