Sciweavers

1373 search results - page 55 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
IAAI
1990
13 years 9 months ago
AudES - An Expert System for Security Auditing
Computer security auditing constitutes an important part of any organization's security procedures. Because of the many inadequacies of currently used manual methods, thoroug...
Gene Tsudik, Rita C. Summers
AINA
2007
IEEE
14 years 3 months ago
The Community Stack: Concept and Prototype
Location awareness and mobility are main factors in pervasive computing. There is a lot of work focusing on develop location aware applications. Generalizing from location awarene...
Tuan Nguyen, Seng Wai Loke, Torab Torabi
PERVASIVE
2009
Springer
14 years 3 months ago
PL-Tags: Detecting Batteryless Tags through the Power Lines in a Building
We present a system, called PL-Tags, for detecting the presence of batteryless tags in a building or home through the power lines. The excitation (or interrogation) and detection o...
Shwetak N. Patel, Erich P. Stuntebeck, Thomas Robe...
WWW
2004
ACM
14 years 9 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
JCS
2010
112views more  JCS 2010»
13 years 7 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...