Sciweavers

461 search results - page 44 / 93
» Protecting Transportation Infrastructure
Sort
View
IWRT
2010
161views Communications» more  IWRT 2010»
13 years 8 months ago
RFID-assisted Product Delivery in Sustainable Supply Chains: A Knowledge-based Approach
The paper proposes an integrated framework which uses knowledge representation theory and languages to annotate relevant product information in a semantically rich and unambiguous ...
Michele Ruta, Floriano Scioscia, Eugenio Di Sciasc...
ACSAC
2000
IEEE
14 years 2 months ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim
DBSEC
2006
86views Database» more  DBSEC 2006»
13 years 11 months ago
Enhancing User Privacy Through Data Handling Policies
The protection of privacy is an increasing concern in today's global infrastructure. One of the most important privacy protection principles states that personal information c...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
FGCS
2008
159views more  FGCS 2008»
13 years 10 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
TC
2008
13 years 10 months ago
Secure Memory Accesses on Networks-on-Chip
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...