Sciweavers

203 search results - page 5 / 41
» A Secure PLAN
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
FM
2003
Springer
115views Formal Methods» more  FM 2003»
14 years 22 days ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty
AICOM
2008
51views more  AICOM 2008»
13 years 7 months ago
To secure an anchor - a recovery planning approach to ambiguity in perceptual anchoring
Lars Karlsson, Abdelbaki Bouguerra, Mathias Broxva...
IMCS
2000
42views more  IMCS 2000»
13 years 7 months ago
Disaster recovery planning: a strategy for data security
Steve M. Hawkins, David C. Yen, David C. Chou