Sciweavers

145 search results - page 19 / 29
» Privacy enhanced access control in pervasive computing envir...
Sort
View
CCS
2004
ACM
14 years 1 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
ACSW
2003
13 years 9 months ago
A Survey of Research on Context-Aware Homes
The seamless integration of people, devices and computation will soon become part of our daily life. Sensors, actuators, wireless networks and ubiquitous devices powered by intelli...
Sven Meyer, Andry Rakotonirainy
SACMAT
2009
ACM
14 years 2 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
IEEEARES
2010
IEEE
14 years 2 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
PERCOM
2003
ACM
14 years 7 months ago
MACA-P: A MAC for Concurrent Transmissions in Multi-Hop Wireless Networks
: This paper presents the initial design and performance study of MACA-P, a RTS/CTS based MAC protocol that enables simultaneous transmissions in multihop ad-hoc wireless networks....
Arup Acharya, Archan Misra, Sorav Bansal