Sciweavers

658 search results - page 32 / 132
» Open problems in the security of learning
Sort
View
WPES
2004
ACM
14 years 2 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
DAC
2004
ACM
14 years 10 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
IHI
2010
160views Healthcare» more  IHI 2010»
13 years 3 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
CCR
2006
136views more  CCR 2006»
13 years 9 months ago
Traffic classification on the fly
The early detection of applications associated with TCP flows is an essential step for network security and traffic engineering. The classic way to identify flows, i.e. looking at...
Laurent Bernaille, Renata Teixeira, Ismael Akodken...
COORDINATION
2008
Springer
13 years 10 months ago
From Flow Logic to Static Type Systems for Coordination Languages
Abstract. Coordination languages are often used to describe open ended systems. This makes it challenging to develop tools for guaranteeing security of the coordinated systems and ...
Rocco De Nicola, Daniele Gorla, René Rydhof...