Sciweavers

859 search results - page 103 / 172
» Security for Key Management Interfaces
Sort
View
CCS
2007
ACM
14 years 4 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
WICON
2008
13 years 11 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
CCGRID
2006
IEEE
14 years 4 months ago
Policy-Based Access Control Framework for Grid Computing
Grid technology enables access and sharing of data and computational resources across administrative domains. Thus, it is important to provide a uniform access and management mech...
Jin Wu, Chokchai Leangsuksun, Vishal Rampure, Hong...
SAFECOMP
2000
Springer
14 years 1 months ago
Derivation of Safety Targets for the Random Failure of Programmable Vehicle Based Systems
Increasingly, the dependability of vehicle based programmable systems is becoming a key feature in ensuring the safety of those in and around the vehicle. The goal of those respons...
Richard Evans, Jonathan D. Moffett
CSREAPSC
2006
13 years 11 months ago
An Access Control Framework for Pervasive Computing Environments
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Sarah Javanmardi, Hadi Hemmati, Rasool Jalili