Sciweavers

434 search results - page 24 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
CCS
2006
ACM
14 years 21 days ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
IPOM
2007
Springer
14 years 3 months ago
Analysis of BGP Origin AS Changes Among Brazil-Related Autonomous Systems
Abstract. On the inter-domain Internet today, the address preļ¬x origin in our BGP operations has become a major security concern. This critical problem can be stated simply as ā€...
Shih-Ming Tseng, Ke Zhang, Shyhtsun Felix Wu, Kwan...
ICTCS
2005
Springer
14 years 2 months ago
A Typed Assembly Language for Non-interference
Abstract. Non-interference is a desirable property of systems in a multilevel security architecture, stating that conļ¬dential information is not disclosed in public output. The c...
Ricardo Medel, Adriana B. Compagnoni, Eduardo Bone...
CBMS
2008
IEEE
14 years 3 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient proļ¬les in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
CN
2010
90views more  CN 2010»
13 years 9 months ago
The price of security in wireless sensor networks
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...
Jongdeog Lee, Krasimira Kapitanova, Sang Hyuk Son