Sciweavers

461 search results - page 39 / 93
» Protecting Transportation Infrastructure
Sort
View
ICALP
2003
Springer
14 years 3 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
HICSS
2002
IEEE
93views Biometrics» more  HICSS 2002»
14 years 2 months ago
Too Much to Carry? Copyright Laws in the Electronic Environment
Digitization of information, the rise of the World Wide Web, and the development of new means for information creation, production and dissemination place new strains on the legal...
Terrence A. Maxwell
SAINT
2007
IEEE
14 years 4 months ago
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior
In this paper, we propose three metrics for detecting botnets through analyzing their behavior. Our social infrastructure (i.e., the Internet) is currently experiencing the danger...
Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shi...
UIST
2004
ACM
14 years 3 months ago
A gesture-based authentication scheme for untrusted public terminals
Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This...
Shwetak N. Patel, Jeffrey S. Pierce, Gregory D. Ab...
BPM
2003
Springer
102views Business» more  BPM 2003»
14 years 3 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory