Sciweavers

1073 search results - page 51 / 215
» Secure context-sensitive authorization
Sort
View
SIGCSE
2005
ACM
108views Education» more  SIGCSE 2005»
14 years 2 months ago
Teaching and learning ethics in computer science: walking the walk
The author shares techniques used in a successful "Ethics and Professionalism" class at California State University, San Bernardino. The author describes active learning...
Richard J. Botting
SACMAT
2005
ACM
14 years 2 months ago
Generalized XML security views
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [17] and later refined by Fan et al. [8]. The model consists of access control ...
Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadk...
CCECE
2006
IEEE
14 years 3 months ago
A Survey of Secure B2C Commerce for Multicast Services
Services such as audio/video streaming, advertising, and software distribution can be delivered much more efficiently by Network Service Providers if multicast data distribution i...
Anil Kumar Venkataiahgari, J. William Atwood, Mour...
TPDS
2010
142views more  TPDS 2010»
13 years 7 months ago
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
Abstract—Vehicular Ad Hoc Network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause d...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
ISM
2006
IEEE
112views Multimedia» more  ISM 2006»
14 years 3 months ago
Security Considerations for SOA-Based Multimedia Applications
Growing levels of digitalization and broadband access drives extremely fast progress in multimedia and networking technologies and allows consumers to create requirements at an ac...
Andrew Roczniak, Alexandre Miège, Abdulmota...