Sciweavers

SECRYPT
2010
132views Business» more  SECRYPT 2010»
14 years 10 months ago
Management of Security Policies in Virtual Organisations
Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej A...
67
Voted
SECRYPT
2010
132views Business» more  SECRYPT 2010»
14 years 10 months ago
Efficient Algorithmic Safety Analysis of HRU Security Models
Anja Fischer, Winfried E. Kühnhauser
75
Voted
SECRYPT
2010
121views Business» more  SECRYPT 2010»
14 years 10 months ago
Risk based Access Control with Uncertain and Time-dependent Sensitivity
John A. Clark, Juan E. Tapiador, John A. McDermid,...
109
Voted
SECRYPT
2010
238views Business» more  SECRYPT 2010»
14 years 10 months ago
QoS and Security in Energy-harvesting Wireless Sensor Networks
Antonio Vincenzo Taddeo, Marcello Mura, Alberto Fe...
SECRYPT
2010
147views Business» more  SECRYPT 2010»
14 years 10 months ago
Security Models for Heterogeneous Networking
Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address t...
Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, ...