Sciweavers

2358 search results - page 162 / 472
» A Secure Pervasive Environment
Sort
View
SERP
2008
13 years 10 months ago
Use of Data Recharging for Personal Information Environment
In this paper we provide a new way of defining personal information environment and its framework using data recharging. Using this new approach, human intervention can significant...
Atif Farid Mohammad
ICOIN
2007
Springer
14 years 3 months ago
A Secure Message Percolation Scheme for Wireless Sensor Network
Wireless Sensor Network (WSN) deployed in hostile environments suffers from severe security threats. In this paper, we propose a Secure Message Percolation (SMP) scheme for WSN. We...
Md. Abdul Hamid, Choong Seon Hong
DAC
1998
ACM
14 years 10 months ago
WELD - An Environment for Web-based Electronic Design
Increasing size and geographical separation of design data and teams has created a need for a network-based electronic design environment that is scaleable, adaptable, secure, hig...
Francis L. Chan, Mark D. Spiller, A. Richard Newto...
DBSEC
2004
97views Database» more  DBSEC 2004»
13 years 10 months ago
Configuring Storage Area Networks for Mandatory Security
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both en...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
PETRA
2010
ACM
13 years 7 months ago
The security and privacy implications of using social networks to deliver healthcare
Healthcare technologies have tended to focus on electronic health records and devices (e.g., devices within the home for patients or handheld devices for nurses and physicians), a...
Carrie Gates, Matt Bishop