Sciweavers

878 search results - page 24 / 176
» A Compiler-Based Approach to Data Security
Sort
View
SASN
2004
ACM
15 years 3 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner
TMC
2010
138views more  TMC 2010»
14 years 8 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
CCS
2007
ACM
15 years 3 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
CSREASAM
2009
14 years 10 months ago
Security Level Determination Using Branes for Contextual Based Global Processing: An Architecture
This paper presents the basics of a new paradigm that allows generators and consumers of global contextual information to determine an appropriate security level needed for contex...
Greg Vert, Evangelos Triantaphyllou
ECEH
2006
144views Healthcare» more  ECEH 2006»
14 years 11 months ago
Process Based Data Logistics: Data Integration for Healthcare Applications
Data integration in medical applications is a crucial and sensitive task. It turns out that there are rigid factors like heterogeneous, distributed data sources, security, and comp...
Stefan Jablonski