Sciweavers

1770 search results - page 327 / 354
» Writing requirements in computer security
Sort
View
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
MIDDLEWARE
2004
Springer
14 years 1 months ago
PoliPer: policies for mobile and pervasive environments
The need for sharing is well known in a large number of distributed applications. These applications are difficult to develop either for fully wired or mobile wireless networks. ...
Luís Veiga, Paulo Ferreira
AGENTS
1999
Springer
13 years 12 months ago
A Personal News Agent That Talks, Learns and Explains
Most work on intelligent information agents has thus far focused on systems that are accessible through the World Wide Web. As demanding schedules prohibit people from continuous ...
Daniel Billsus, Michael J. Pazzani
ESORICS
2007
Springer
13 years 11 months ago
Satisfiability and Resiliency in Workflow Systems
We propose the role-and-relation-based access control (R2 BAC) model for workflow systems. In R2 BAC, in addition to a user's role memberships, the user's relationships w...
Qihua Wang, Ninghui Li
SOUPS
2010
ACM
13 years 11 months ago
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...