Sciweavers

1116 search results - page 131 / 224
» Secure Mediation: Requirements and Design
Sort
View
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 9 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja
ICSE
2003
IEEE-ACM
14 years 9 months ago
DADO: Enhancing Middleware to Support Crosscutting Features in Distributed, Heterogeneous Systems
Some "non-' or "extra-functional" features, such as reliability, security, and tracing, defy modularization mechanisms in programming languages. This makes suc...
Eric Wohlstadter, Stoney Jackson, Premkumar T. Dev...
ARC
2009
Springer
241views Hardware» more  ARC 2009»
14 years 4 months ago
Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm
As the need for information security increases in our everyday life, the job of encoding/decoding for secure information delivery becomes a critical issue in data network systems. ...
Jaeyoung Yi, Karam Park, Joonseok Park, Won Woo Ro
CBMS
2008
IEEE
14 years 3 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
MOBILITY
2009
ACM
14 years 2 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...