Sciweavers

1605 search results - page 226 / 321
» E-commerce Security Issues
Sort
View
133
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
115
Voted
PERCOM
2006
ACM
15 years 10 months ago
A Campus-Wide Mobile EMS Information Management System
—Efficient information management is crucial for the timely administration of Emergency Medical Services (EMS). In this paper, we describe a project to design and implement an au...
Brian R. L'Heureux, Michael J. McHugh, Benjamin D....
SUTC
2006
IEEE
15 years 10 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
TRIDENTCOM
2006
IEEE
15 years 10 months ago
Barcelona's open access network testbed
Abstract— This paper describes the implementation and deployment of a novel architecture for a metropolitan open wireless access network, shared among different service providers...
Jaume Barceló, Carlos Macián, Jorge ...
AINA
2005
IEEE
15 years 9 months ago
A Scheme for Testing Privacy State in Pervasive Sensor Networks
More and more sensor networks will be deployed in the place where people are living, studying, and working. These sensor networks bring us the convenience of accessing information...
Yingpeng Sang, Hong Shen