Sciweavers

897 search results - page 43 / 180
» Security Requirements for RFID Computing Systems
Sort
View
WETICE
2007
IEEE
14 years 2 months ago
Enabling Collaborative eHealth through Triplespace Computing
The design and promotion of electronic patient summaries as an instrument to facilitate the pervasive delivery of healthcare is emerging as a key technology in eHealth solutions. ...
Lyndon J. B. Nixon, Dario Cerizza, Emanuele Della ...
SUTC
2006
IEEE
14 years 2 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
ICDCSW
2007
IEEE
14 years 2 months ago
Taxonomy of Email Reputation Systems
Today a common goal in the area of email security is to provide protection from a wide variety of threats by being more predictive instead of reactive and to identify legitimate m...
Dmitri Alperovitch, Paul Judge, Sven Krasser
IEEESCC
2008
IEEE
14 years 2 months ago
Adaptive Secure Access to Remote Services
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RP...
Hanping Lufei, Weisong Shi, Vipin Chaudhary
CCS
2001
ACM
14 years 17 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé