Sciweavers

11603 search results - page 92 / 2321
» Securing Embedded Systems
Sort
View
116
Voted
CCS
2000
ACM
15 years 6 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
CSFW
2000
IEEE
15 years 5 months ago
Possibilistic Definitions of Security - An Assembly Kit
We present a framework in which different notions of security can be defined in a uniform and modular way. Each definition of security is formalized as a security predicate by ass...
Heiko Mantel
126
Voted
DGO
2007
168views Education» more  DGO 2007»
15 years 3 months ago
A distributed event-triggered knowledge sharing system
Government agencies globally are facing problems such as illegal immigration, terrorism, and disease diagnosis and control. Solutions to these problems rely heavily on collaborati...
Seema Degwekar, Jeff DePree, Stanley Y. W. Su, How...
123
Voted
HICSS
2009
IEEE
138views Biometrics» more  HICSS 2009»
15 years 5 months ago
E-Voting System Security Optimization
Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holi...
Barbara Ondrisek
113
Voted
CCS
2008
ACM
15 years 4 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun