Sciweavers

1352 search results - page 145 / 271
» Designing Security Requirements Models Through Planning
Sort
View
145
Voted
WIOPT
2010
IEEE
15 years 1 months ago
On the optimal design of MAC protocols in multi-hop ad hoc networks
Abstract—In this paper, we present our results on the performance of MAC protocols in multi-hop wireless ad hoc networks in terms of the newly proposed metric “aggregate multi-...
Mariam Kaynia, Pedro H. J. Nardell, Paulo Cardieri...
128
Voted
CBMS
2008
IEEE
15 years 10 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
132
Voted
IEEECIT
2006
IEEE
15 years 9 months ago
Design and Implementation of Distributed Task Sequencing on GridRPC
In the framework of GridRPC, a new function that allows direct data transfer between RPC servers is implemented for efficient execution of a Task Sequencing job in a grid environ...
Yusuke Tanimura, Hidemoto Nakada, Yoshio Tanaka, S...
356
Voted
ICDE
2009
IEEE
1081views Database» more  ICDE 2009»
17 years 3 months ago
Modeling and Integrating Background Knowledge in Data Anonymization
Recent work has shown the importance of considering the adversary’s background knowledge when reasoning about privacy in data publishing. However, it is very difficult for the d...
Tiancheng Li, Ninghui Li, Jian Zhang
FSTTCS
2003
Springer
15 years 8 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh