Sciweavers

626 search results - page 43 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
ACSAC
1999
IEEE
14 years 1 months ago
Trustworthy Access Control with Untrustworthy Web Servers
If sensitive information is to be included in a shared web, access controls will be required. However, the complex software needed to provide a web service is prone to failure. To...
Tim Wilkinson, Dave Hearn, Simon R. Wiseman
CSFW
2006
IEEE
14 years 3 months ago
Decentralized Robustness
Robustness links confidentiality and integrity properties of a computing system and has been identified as a useful property for characterizing and enforcing security. Previous ...
Stephen Chong, Andrew C. Myers
BSN
2009
IEEE
330views Sensor Networks» more  BSN 2009»
14 years 11 days ago
Speckled Tango Dancers: Real-Time Motion Capture of Two-Body Interactions Using On-body Wireless Sensor Networks
: This project investigates the application of a fully wireless network of inertial sensors for full-body, 3-D motion capture, for the real-time analysis of Tango dancing. Towards ...
D. K. Arvind, Aris Valtazanos
SOSP
2009
ACM
14 years 6 months ago
Fabric: a platform for secure distributed computation and storage
Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows heterogeneous network nodes to securely share bot...
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Luc...
IAW
2003
IEEE
14 years 2 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...