Sciweavers

1288 search results - page 141 / 258
» Securing aspect composition
Sort
View
ATAL
2006
Springer
14 years 2 months ago
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...
Rafal Leszczyna, Janusz Górski
IJBC
2006
93views more  IJBC 2006»
13 years 10 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li
CL
2002
Springer
13 years 10 months ago
Behavioural typing for safe ambients
We introduce a typed variant of Safe Ambients, named Secure Safe Ambients (SSA), whose type system allows behavioral invariants of ambients to be expressed and verified. The most ...
Michele Bugliesi, Giuseppe Castagna
IHI
2010
124views Healthcare» more  IHI 2010»
13 years 5 months ago
Reliable medical recommendation systems with patient privacy
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
MEDES
2010
ACM
13 years 5 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...