Sciweavers

1323 search results - page 85 / 265
» Updatable Security Views
Sort
View
COMPSAC
2006
IEEE
14 years 4 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
PCM
2004
Springer
116views Multimedia» more  PCM 2004»
14 years 3 months ago
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme
Recently, Yen and Guo proposed a chaotic neural network (CNN) for signal encryption, which was suggested as a solution for protection of digital images and videos. The present pape...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
EUROSEC
2010
ACM
14 years 5 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
WS
2003
ACM
14 years 3 months ago
On securely enabling intermediary-based services and performance enhancements for wireless mobile users
Intermediary-based services and performance optimizations are increasingly being considered, by network service providers, with a view towards offering value-added services and i...
Sneha Kumar Kasera, Semyon Mizikovsky, Ganapathy S...
ISPA
2005
Springer
14 years 3 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...