Sciweavers

23 search results - page 3 / 5
» Automata-Based Confidentiality Monitoring
Sort
View
ESAS
2006
Springer
14 years 14 days ago
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines...
Frederik Armknecht, Joao Girão, Marc Stoeck...
EDBT
2009
ACM
145views Database» more  EDBT 2009»
14 years 20 days ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
MOBISYS
2007
ACM
14 years 8 months ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang
MCAM
2007
Springer
134views Multimedia» more  MCAM 2007»
14 years 2 months ago
Virtual Community Based Secure Service Discovery and Access for 3D Video Steaming Applications
The Freeband I-Share project aims to define the mechanisms for trust, willingness, resource discovery and sharing mechanisms in virtual communities. To improve the secure and perfo...
Shudong Chen, Igor Radovanovic, Johan Lukkien, Ric...
CONEXT
2006
ACM
14 years 2 months ago
SNARE: sensor node attached reputation evaluator
Secure routing in wireless sensor networks (WSN) is a crucial problem that has drawn the attention of researchers. The motivation for tackling this problem comes directly from the...
Ismat K. Maarouf, A. R. Naseer