Sciweavers

1120 search results - page 149 / 224
» Trust in Electronic Environments
Sort
View
ICTAI
2009
IEEE
14 years 4 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
ITCC
2005
IEEE
14 years 3 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
ICSM
2008
IEEE
14 years 4 months ago
Standard-based data and service interoperability in eHealth systems
International standardization in information representation, organization, and dissemination are meant to eliminate the discrepancies in communication among participating organiza...
Kamran Sartipi, Mohammad H. Yarmand
ICMI
2007
Springer
101views Biometrics» more  ICMI 2007»
14 years 4 months ago
Disambiguating speech commands using physical context
Speech has great potential as an input mechanism for ubiquitous computing. However, the current requirements necessary for accurate speech recognition, such as a quiet environment...
Katherine Everitt, Susumu Harada, Jeff A. Bilmes, ...
EUROSYS
2009
ACM
14 years 7 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...