Sciweavers

2846 search results - page 152 / 570
» Not one click for security
Sort
View
SUTC
2008
IEEE
15 years 11 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
DSN
2007
IEEE
15 years 11 months ago
Robustness and Security Hardening of COTS Software Libraries
COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and s...
Martin Süßkraut, Christof Fetzer
GLOBECOM
2007
IEEE
15 years 11 months ago
Developing a Group-based Security Scheme for Wireless Sensor Networks
—This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number ...
Md. Abdul Hamid, Md. Mustafizur Rahman, Young Yig ...
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
15 years 11 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila
IEEEARES
2007
IEEE
15 years 11 months ago
Towards Secure E-Elections in Turkey: Requirements and Principles
E-democracy is a necessity in this era of computers and information technology. E-voting is one of the most significant parts of e-democracy, which refers to the use of computers ...
Orhan Cetinkaya, Deniz Cetinkaya