Sciweavers

18697 search results - page 141 / 3740
» Systemic Security Management
Sort
View
98
Voted
ACISP
2010
Springer
15 years 6 months ago
Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems
Marek Klonowski, Michal Koza, Miroslaw Kutylowski
CRISIS
2009
15 years 5 months ago
Formal analysis of attacks for e-voting system
Komminist Weldemariam, Richard A. Kemmerer, Adolfo...
123
Voted
EUROPKI
2009
Springer
15 years 2 months ago
Privacy and Liveliness for Reputation Systems
Stefan Schiffner, Sebastian Clauß, Sandra St...
ICTAI
2009
IEEE
15 years 11 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu