Sciweavers

2358 search results - page 339 / 472
» A Secure Pervasive Environment
Sort
View
MMMACNS
2001
Springer
15 years 9 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
ISN
1999
Springer
139views Communications» more  ISN 1999»
15 years 8 months ago
Simplifying Real-Time Multimedia Application Development Using Session Descriptions
This paper presents a novel approach that simplifies real-time multimedia communication applications development and service provision. Such applications are no longer required to...
Sarom Ing, Steve Rudkin
SP
1990
IEEE
15 years 8 months ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III
ACSAC
2007
IEEE
15 years 8 months ago
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks
Wireless sensor nodes lack hardware support for tamperresistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and compromise by an ad...
Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Set...
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 8 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge