Sciweavers

2009 search results - page 290 / 402
» A privacy-aware access control system
Sort
View
HICSS
2008
IEEE
144views Biometrics» more  HICSS 2008»
14 years 4 months ago
Frameworks for Securing Limited-Device Applications
In this paper, we compare the features available for developing secure distributed applications for limited devices, such as smart phones. We limit our scope to examine frameworks...
Timothy E. Lindquist, Aarthi Ramamurthy, Ramon Ang...
IEEEARES
2008
IEEE
14 years 4 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...
AINA
2007
IEEE
14 years 4 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
HICSS
2007
IEEE
122views Biometrics» more  HICSS 2007»
14 years 4 months ago
False Information in Internet Auction Communities
As one of the most important features, the Internet enables individuals to make their personal thoughts and opinions easily accessible to the global community of Internet users. N...
Oliver Hinz
ICDIM
2007
IEEE
14 years 4 months ago
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chu...