Sciweavers

878 search results - page 56 / 176
» A Compiler-Based Approach to Data Security
Sort
View
SOUPS
2009
ACM
15 years 10 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
ESSOS
2009
Springer
15 years 10 months ago
Idea: Trusted Emergency Management
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency i...
Timothy E. Levin, Cynthia E. Irvine, Terry Benzel,...
ETFA
2008
IEEE
15 years 10 months ago
Denial-of-service in automation systems
Security aspects of today’s automation systems gain increasing importance. One critical point regarding security is the exchange of control data over the network. Recently, cryp...
Wolfgang Granzer, Christian Reinisch, Wolfgang Kas...
108
Voted
SERP
2008
15 years 5 months ago
Use of Data Recharging for Personal Information Environment
In this paper we provide a new way of defining personal information environment and its framework using data recharging. Using this new approach, human intervention can significant...
Atif Farid Mohammad
140
Voted
ICSE
2008
IEEE-ACM
16 years 4 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb