Sciweavers

5722 search results - page 145 / 1145
» Security Function Interactions
Sort
View
NAR
2007
100views more  NAR 2007»
13 years 8 months ago
PIC: Protein Interactions Calculator
Interactions within a protein structure and interactions between proteins in an assembly are essential considerations in understanding molecular basis of stability and functions o...
K. G. Tina, R. Bhadra, N. Srinivasan
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
SRDP: Securing Route Discovery in DSR
Routing is a critical function in multi-hop mobile ad hoc networks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is widely considered bot...
Jihye Kim, Gene Tsudik
OTM
2005
Springer
14 years 2 months ago
Security Ontology for Annotating Resources
Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ...
Anya Kim, Jim Luo, Myong H. Kang
CARDIS
2004
Springer
150views Hardware» more  CARDIS 2004»
14 years 2 months ago
Enforcing High-Level Security Properties for Applets
Smart card applications often handle privacy-sensitive information, and therefore must obey certain security policies. Typically, such policies are described as high-level security...
Mariela Pavlova, Gilles Barthe, Lilian Burdy, Mari...
EDOC
2003
IEEE
14 years 2 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...