Sciweavers

58 search results - page 3 / 12
» An Introduction to Standards related to Information Security
Sort
View
CSCWD
2008
Springer
13 years 9 months ago
XML and web services security
With an increasing amount of semi-structured data XML has become important. XML documents may contain private information that cannot be shared by all user communities. Therefore,...
Lili Sun, Yan Li
MMMACNS
2010
Springer
13 years 6 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
BMCBI
2008
99views more  BMCBI 2008»
13 years 7 months ago
CWRML: representing crop wild relative conservation and use data in XML
Background: Crop wild relatives are wild species that are closely related to crops. They are valuable as potential gene donors for crop improvement and may help to ensure food sec...
Jonathan D. Moore, Shelagh P. Kell, Jose M. Iriond...
SAFECOMP
2007
Springer
14 years 1 months ago
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety
The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airplanes with wired and wireless network interfaces offer a wide spectrum of network ...
Richard Robinson, Mingyan Li, Scott Lintelman, Kri...
ICC
2009
IEEE
127views Communications» more  ICC 2009»
14 years 2 months ago
Security Games with Incomplete Information
—We study two-player security games which can be viewed as sequences of nonzero-sum matrix games where at each stage of the iterations the players make imperfect observations of ...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar