Sciweavers

49 search results - page 7 / 10
» Temporal Logics of Knowledge and their Applications in Secur...
Sort
View
ICIC
2009
Springer
14 years 1 months ago
Ontology-Based Decision Support for Security Management in Heterogeneous Networks
Abstract. In this paper our original methodology of applying ontologybased logic into decision support system for security management in heterogeneous networks is presented. Such d...
Michal Choras, Rafal Kozik, Adam Flizikowski, Rafa...
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
11 years 9 months ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 8 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
PERCOM
2007
ACM
14 years 6 months ago
SOS: Secure Overlay Sensornets
Overlay Networks (ONs) are logical networks built on top of a physical network with the aim of moving part of the routing complexity to the application layer. At the same time, sen...
Leonardo B. Oliveira, Antonio Alfredo Ferreira Lou...
SASN
2005
ACM
14 years 7 days ago
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Rec...
Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi ...