Sciweavers

804 search results - page 135 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
CCS
2008
ACM
15 years 6 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
ESWS
2008
Springer
15 years 6 months ago
xOperator - An Extensible Semantic Agent for Instant Messaging Networks
Instant Messaging is in addition to Web and Email the most popular service on the Internet. With xOperator we demonstrate the implementation of a strategy which deeply integrates I...
Sebastian Dietzold, Jörg Unbehauen, Söre...
ESWS
2008
Springer
15 years 6 months ago
xOperator - Interconnecting the Semantic Web and Instant Messaging Networks
Instant Messaging (IM) is in addition to Web and Email the most popular service on the Internet. With xOperator we present a strategy and implementation which deeply integrates Ins...
Sebastian Dietzold, Jörg Unbehauen, Söre...
DBSEC
2010
161views Database» more  DBSEC 2010»
15 years 5 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...
ICSOFT
2007
15 years 5 months ago
Solving Design Issues in Web Meta-Model Approach to Support End-User Development
End-user development is proposed as a solution to the issues business organisations face when developing web applications to support their business processes. We are proposing a me...
Buddhima De Silva, Athula Ginige