Sciweavers

1866 search results - page 278 / 374
» A graph-theoretic approach to distributed control over netwo...
Sort
View
CCS
2006
ACM
14 years 20 days ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
HAPTICS
2009
IEEE
14 years 3 months ago
Perceptual coding of haptic data in time-delayed teleoperation
In telepresence and teleaction systems the haptic communication channel plays a central role. As it closes a global control loop any introduced communication delay possibly destab...
Iason Vittorias, Julius Kammerl, Sandra Hirche, Ec...
ETFA
2008
IEEE
14 years 3 months ago
Denial-of-service in automation systems
Security aspects of today’s automation systems gain increasing importance. One critical point regarding security is the exchange of control data over the network. Recently, cryp...
Wolfgang Granzer, Christian Reinisch, Wolfgang Kas...
FROCOS
2007
Springer
14 years 3 months ago
Combining Algorithms for Deciding Knowledge in Security Protocols
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Mathilde Arnaud, Véronique Cortier, St&eacu...
ECIS
2000
13 years 10 months ago
Towards a Secure Web-Based Health Care Application
Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
Susanne Röhrig, Konstantin Knorr