Sciweavers

279 search results - page 46 / 56
» Providing Security in 4G Systems: Unveiling the Challenges
Sort
View
GRID
2005
Springer
14 years 1 months ago
An end-to-end Web services-based infrastructure for biomedical applications
— Services-oriented architectures hold a lot of promise for grid-enabling scientific applications. In recent times, Web services have gained wide-spread acceptance in the Grid c...
Sriram Krishnan, Kim Baldridge, Jerry P. Greenberg...
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
14 years 1 hour ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu
COMPSAC
2007
IEEE
13 years 11 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
TGC
2007
Springer
14 years 1 months ago
Adversaries and Information Leaks (Tutorial)
Secure information flow analysis aims to prevent programs from leaking their H (high) inputs to their L (low) outputs. A major challenge in this area is to relax the standard noni...
Geoffrey Smith
ICDCS
2005
IEEE
14 years 1 months ago
Enhancing Source-Location Privacy in Sensor Network Routing
— One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechani...
Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal...