Sciweavers

505 search results - page 91 / 101
» Access Control and Trust in the Use of Widely Distributed Se...
Sort
View
CCS
2010
ACM
14 years 2 months ago
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...
JIPS
2007
223views more  JIPS 2007»
13 years 7 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
INFOCOM
2005
IEEE
14 years 1 months ago
Packetostatics: deployment of massively dense sensor networks as an electrostatics problem
— We investigate the spatial distribution of wireless nodes that can transport a given volume of traffic in a sensor network, while requiring the minimum number of wireless node...
Stavros Toumpis, Leandros Tassiulas
SACMAT
2009
ACM
14 years 2 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
BMCBI
2007
131views more  BMCBI 2007»
13 years 8 months ago
FUNC: a package for detecting significant associations between gene sets and ontological annotations
Background: Genome-wide expression, sequence and association studies typically yield large sets of gene candidates, which must then be further analysed and interpreted. Informatio...
Kay Prüfer, Bjoern Muetzel, Hong Hai Do, Gunt...