Sciweavers

461 search results - page 73 / 93
» Developing security protocols by refinement
Sort
View
CCS
2005
ACM
14 years 1 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
WS
2004
ACM
14 years 1 months ago
A framework for wireless LAN monitoring and its applications
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of th...
Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala
AIME
1997
Springer
14 years 2 days ago
A Task-Specific Ontology for the Application and Critiquing of Time-Oriented Clinical Guidelines
: Clinical guidelines reuse existing clinical procedural knowledge while leaving room for flexibility by the care provider applying that knowledge. Guidelines can be viewed as gene...
Yuval Shahar, Silvia Miksch, Peter Johnson
SP
2008
IEEE
13 years 7 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight
EDBT
2008
ACM
172views Database» more  EDBT 2008»
14 years 8 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...