Sciweavers

ICAI
2009
13 years 2 months ago
Autonomic Self-Healing for MANETs
Junaid Ahsenali Chaudhry, Yonghwan Lee, Ken R. Pen...
ADT
2006
13 years 4 months ago
Data Confidentiality: to which extent cryptography and secured hardware can help
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
ECUMN
2007
Springer
13 years 10 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...