Sciweavers

270 search results - page 40 / 54
» Verifying Second-Level Security Protocols
Sort
View
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
14 years 8 months ago
Secure outsourced aggregation via one-way chains
We consider the Outsourced Aggregation model, where sensing services outsource their sensor data collection and aggregation tasks to third-party service providers called aggregato...
Suman Nath, Haifeng Yu, Haowen Chan
IJMI
2007
140views more  IJMI 2007»
13 years 8 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
ESORICS
2002
Springer
14 years 8 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz
MOBISYS
2007
ACM
14 years 8 months ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang
COMCOM
2006
100views more  COMCOM 2006»
13 years 8 months ago
A secure alternate path routing in sensor networks
This paper presents a secure alternate path routing in sensor networks. Our alternate path scheme makes the routing protocol resilient in the presence of malicious nodes that laun...
Suk-Bok Lee, Yoon-Hwa Choi