Sciweavers

3712 search results - page 567 / 743
» Role-Based Access Control
Sort
View
129
Voted
CCS
2007
ACM
15 years 8 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
CCS
2007
ACM
15 years 8 months ago
Direct static enforcement of high-level security policies
A high-level security policy states an overall safety requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires ...
Qihua Wang, Ninghui Li
CCS
2007
ACM
15 years 8 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...
126
Voted
HPCC
2007
Springer
15 years 8 months ago
Reliable Event Detection and Congestion Avoidance in Wireless Sensor Networks
Due to dense deployment and innumerable amount of traffic flow in wireless sensor networks (WSNs), congestion becomes more common phenomenon from simple periodic traffic to unpredi...
Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Md. Abd...
ICCS
2007
Springer
15 years 8 months ago
Searching and Updating Metric Space Databases Using the Parallel EGNAT
Abstract. The Evolutionary Geometric Near-neighbor Access Tree (EGNAT) is a recently proposed data structure that is suitable for indexing large collections of complex objects. It ...
Mauricio Marín, Roberto Uribe, Ricardo J. B...