Sciweavers

2358 search results - page 361 / 472
» A Secure Pervasive Environment
Sort
View
CBMS
2006
IEEE
15 years 10 months ago
How to Break Access Control in a Controlled Manner
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control. The Biostatistics and ...
Ana Ferreira, Ricardo João Cruz Correia, Lu...
INFOCOM
2006
IEEE
15 years 10 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
PLDI
2006
ACM
15 years 10 months ago
Specifying distributed trust management in LolliMon
We propose the monadic linear logic programming language LolliMon as a new foundation for the specification of distributed trust management systems, particularly the RT framework...
Jeff Polakow, Christian Skalka
SWS
2006
ACM
15 years 10 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
ESCIENCE
2005
IEEE
15 years 10 months ago
Grid-Enabling an Existing Instrument-Based National Service
Recent work by the ‘CombeChem’ project together with the UK National Crystallography Service (NCS) has integrated the NCS into an e-Science environment. The existing high-thro...
Jeremy G. Frey, Sam Peppe, Mike Surridge, Ken Meac...