Sciweavers

692 search results - page 52 / 139
» Shamon: A System for Distributed Mandatory Access Control
Sort
View
ICNP
2003
IEEE
14 years 4 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
TITB
2010
128views Education» more  TITB 2010»
13 years 5 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
POLICY
2007
Springer
14 years 5 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
SOCA
2007
IEEE
14 years 5 months ago
VIDIHIP - A Web Service based Integration Platform for Power Plant Control Systems
European energy supply companies typically run a conglomerate of different, geographically distributed power plants. Unfortunately, the corresponding power plant control systems a...
Mark Strembeck, Otto U. Plhal
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 11 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang