Sciweavers

116 search results - page 8 / 24
» CoPS - Checker of Persistent Security
Sort
View
ICDE
2008
IEEE
140views Database» more  ICDE 2008»
14 years 8 months ago
A Security Punctuation Framework for Enforcing Access Control on Streaming Data
The management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where acc...
Rimma V. Nehme, Elke A. Rundensteiner, Elisa Berti...
SAC
2009
ACM
14 years 4 days ago
Towards developing a trust-based security solution
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small...
Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Shari...
MANSCI
2008
106views more  MANSCI 2008»
13 years 6 months ago
Can They Take It With Them? The Portability of Star Knowledge Workers' Performance
This paper examines the portability of star security analysts' performance. Star analysts who switched employers experienced an immediate decline in performance that persiste...
Boris Groysberg, Linda-Eling Lee, Ashish Nanda
CCS
2009
ACM
14 years 2 months ago
XCS: cross channel scripting and its impact on web applications
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
Hristo Bojinov, Elie Bursztein, Dan Boneh
SIGCOMM
1995
ACM
13 years 11 months ago
Authentication Protocols for Personal Communication Systems
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of t...
Hung-Yu Lin, Lein Harn