Sciweavers

626 search results - page 28 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
A Reliable, Scalable General-Purpose Certificate Store
Although there have been various proposals to build large-scale PKIs, there appears to be no research publicly available on the underlying certificate store which will be required...
Peter Gutmann
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
14 years 3 months ago
Electronic Voting: Algorithmic and Implementation Issues
Electronic Transactions over the Internet, particularly using the World Wide Web have become an integral part of economic life. Recently also the public sector has started to use ...
Robert Kofler, Robert Krimmer, Alexander Prosser
PERCOM
2007
ACM
14 years 9 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
SAFECOMP
2005
Springer
14 years 3 months ago
Justification of Smart Sensors for Nuclear Applications
This paper describes the results of a research study sponsored by the UK nuclear industry into methods of justifying smart sensors. Smart sensors are increasingly being used in the...
Peter G. Bishop, Robin E. Bloomfield, Sofia Guerra...
PDPTA
1996
13 years 11 months ago
Document Retrieval Performance on Parallel Systems
The problem of eciently retrieving and ranking documents from a huge collection according to their relevance to a research topic is addressed. A broad class of queries is de ned a...
David Hawking