Sciweavers

6555 search results - page 128 / 1311
» Secure attribute-based systems
Sort
View
118
Voted
VTC
2007
IEEE
112views Communications» more  VTC 2007»
15 years 8 months ago
"The Medium is The Message": Secure Communication via Waveform Coding in MIMO Systems
— In this paper, we look at multiple antenna systems and code information on the communication medium itself to improve the link security. In the case of single data stream trans...
Xin Zhou, Persefoni Kyritsi, Patrick C. F. Eggers,...
125
Voted
FSKD
2006
Springer
106views Fuzzy Logic» more  FSKD 2006»
15 years 6 months ago
Fuzzy Optimization for Security Sensors Deployment in Collaborative Intrusion Detection System
This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
Chengchen Hu, Zhen Liu, Zhen Chen, Bin Liu
IWFM
2000
167views Formal Methods» more  IWFM 2000»
15 years 3 months ago
An Algebraic Basis for Specifying and Enforcing Access Control in Security Systems
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
Claus Pahl
PERCOM
2007
ACM
16 years 1 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
FTDCS
2003
IEEE
15 years 7 months ago
Secure Middleware for Situation-Aware Naval C2 and Combat Systems
There is an increasing need within the Navy and Marine Corps for building distributed situation-aware applications that are rapidly recon gurable and survivable in the face of att...
Ramesh Bharadwaj