Sciweavers

314 search results - page 27 / 63
» ITOSS: An Integrated Toolkit For Operating System Security
Sort
View
IEEEARES
2006
IEEE
14 years 2 months ago
E-voting: Dependability Requirements and Design for Dependability
Elections are increasingly dependent on computers and telecommunication systems. Such “E-voting” schemes create socio-technical systems (combinations of technology and human o...
Jeremy Bryans, Bev Littlewood, Peter Y. A. Ryan, L...
SACMAT
2011
ACM
12 years 11 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we de...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
PERCOM
2005
ACM
14 years 8 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
VTC
2007
IEEE
101views Communications» more  VTC 2007»
14 years 2 months ago
Secure Position-Based Routing for VANETs
— Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So fa...
Charles Harsch, Andreas Festag, Panos Papadimitrat...
CG
1999
Springer
13 years 8 months ago
An interactive visualization and navigation tool for medical volume data
In order to make direct volume rendering practicable convenient visualization options and data analysis tools have to be integrated. For example, direct rendering of semi-transpar...
Ove Sommer, Alexander Dietz, Rüdiger Westerma...