Sciweavers

461 search results - page 44 / 93
» Protecting Transportation Infrastructure
Sort
View
145
Voted
IWRT
2010
161views Communications» more  IWRT 2010»
15 years 1 months ago
RFID-assisted Product Delivery in Sustainable Supply Chains: A Knowledge-based Approach
The paper proposes an integrated framework which uses knowledge representation theory and languages to annotate relevant product information in a semantically rich and unambiguous ...
Michele Ruta, Floriano Scioscia, Eugenio Di Sciasc...
ACSAC
2000
IEEE
15 years 7 months ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim
DBSEC
2006
86views Database» more  DBSEC 2006»
15 years 4 months ago
Enhancing User Privacy Through Data Handling Policies
The protection of privacy is an increasing concern in today's global infrastructure. One of the most important privacy protection principles states that personal information c...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
143
Voted
FGCS
2008
159views more  FGCS 2008»
15 years 3 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
146
Voted
TC
2008
15 years 3 months ago
Secure Memory Accesses on Networks-on-Chip
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...