Sciweavers

1288 search results - page 100 / 258
» Securing aspect composition
Sort
View
ISM
2006
IEEE
76views Multimedia» more  ISM 2006»
14 years 4 months ago
Peer-to-Peer Secure and Private Community Based Multimedia Communications
We have designed and implemented P2PWNC, a fully distributed, open to all, autonomous WLAN roaming scheme that can be used in a community to provide various multimedia communicati...
Pantelis A. Frangoudis, George C. Polyzos
COLCOM
2009
IEEE
14 years 3 months ago
Towards a framework for group-centric secure collaboration
—The concept of groups is a natural aspect of most collaboration scenarios. Group-Centric Secure Information Sharing models (g-SIS) have been recently proposed in which users and...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
INFORMATIKTAGE
2008
13 years 11 months ago
Practical Secure Function Evaluation
: This thesis focuses on the practical aspects of general two-party Secure Function Evaluation (SFE). A new SFE protocol that allows free evaluation of XOR gates and is provably se...
Thomas Schneider 0003
SWWS
2008
13 years 11 months ago
A proposal for Ontology Security Standards
- Semantic technologies, such as RDF (Resource Description Framework) and OWL (Web Ontology Language), are being widely used to store information. Ontology is mostly used in semant...
Muhammad Reza Fatemi, Atilla Elçi, Zeki Bay...
IM
2003
13 years 11 months ago
Multiple Authorization - A Model and Architecture for Increased, Practical Security
: Security of systems and management infrastructure is crucial for a successful, reliable and safe use. Most currently deployed systems are based on simple subject/object-relations...
Gerald Vogt