Sciweavers

SECRYPT
2010
132views Business» more  SECRYPT 2010»
13 years 2 months ago
Management of Security Policies in Virtual Organisations
Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej A...
SECRYPT
2010
132views Business» more  SECRYPT 2010»
13 years 2 months ago
Efficient Algorithmic Safety Analysis of HRU Security Models
Anja Fischer, Winfried E. Kühnhauser
SECRYPT
2010
121views Business» more  SECRYPT 2010»
13 years 2 months ago
Risk based Access Control with Uncertain and Time-dependent Sensitivity
John A. Clark, Juan E. Tapiador, John A. McDermid,...
SECRYPT
2010
238views Business» more  SECRYPT 2010»
13 years 2 months ago
QoS and Security in Energy-harvesting Wireless Sensor Networks
Antonio Vincenzo Taddeo, Marcello Mura, Alberto Fe...
SECRYPT
2010
147views Business» more  SECRYPT 2010»
13 years 2 months ago
Security Models for Heterogeneous Networking
Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address t...
Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, ...