Sciweavers

718 search results - page 59 / 144
» Operational Semantics of Security Protocols
Sort
View
ESORICS
2006
Springer
13 years 11 months ago
A Formal Model of Access Control for Mobile Interactive Devices
Abstract. This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary perm...
Frédéric Besson, Guillaume Dufay, Th...
LISA
2003
13 years 9 months ago
EasyVPN: IPsec Remote Access Made Easy
Telecommuting and access over a Wireless LAN require strong security at the network level. Although IPsec is well-suited for this task, it is difficult to configure and operate ...
Mark C. Benvenuto, Angelos D. Keromytis
ITCC
2002
IEEE
14 years 25 days ago
Performance of Multimedia Applications with IPSec Tunneling
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of...
Samir Al-Khayatt, Siraj A. Shaikh, Babak Akhgar, J...
ISCN
2006
IEEE
14 years 1 months ago
An optimistic fair e-commerce protocol for large e-goods
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want ...
Cagil Can Oniz, Erkay Savas, Albert Levi
BIOSTEC
2008
148views Healthcare» more  BIOSTEC 2008»
13 years 9 months ago
Representing and Reasoning with Temporal Constraints in Clinical Trials Using Semantic Technologies
Clinical trial protocols include schedule of clinical trial activities such as clinical tests, procedures, and medications. The schedule specifies temporal constraints on the seque...
Ravi D. Shankar, Susana B. Martins, Martin J. O'Co...