Sciweavers

729 search results - page 71 / 146
» Towards Secure e-Services
Sort
View
WIMOB
2007
IEEE
14 years 3 months ago
Securing Virtual Private Networks with SIM Authentication
—  With the ever increasing amount of systems requiring user authentication, users are experiencing an substantial inconvenience. A huge amount of passwords needs to be remember...
Torstein Bjørnstad, Ivar Jørstad, Do...
ICDCIT
2004
Springer
14 years 2 months ago
Distributing Key Updates in Secure Dynamic Groups
We focus on the problem of distributing key updates in secure dynamic groups. Due to changes in group membership, the group controller needs to change and distribute the keys used...
Sandeep S. Kulkarni, Bezawada Bruhadeshwar
IEEEHPCS
2010
13 years 7 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
COMPLEXITY
2007
151views more  COMPLEXITY 2007»
13 years 9 months ago
From complex conflicts to stable cooperation: Cases in environment and security
: Conflict is a dynamic and complex form of human interaction, often emerging from incompatible actions, values and goals, and consuming a considerable amount of resources. Conflic...
Jürgen Scheffran, Bruce Hannon
IJMI
2002
142views more  IJMI 2002»
13 years 9 months ago
Quality assured trusted third parties for deploying secure internet-based healthcare applications
In this paper we present a complete reference framework for the provision of quality assured Trusted Third Party (TTP) services within a medical environment. The main objective is...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...