Sciweavers

3420 search results - page 184 / 684
» A Language-Based Approach to Security
Sort
View
SOCIALCOM
2010
15 years 2 months ago
Securing Shareable Life-logs
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In parti...
Reza Rawassizadeh, A Min Tjoa
ICC
2009
IEEE
119views Communications» more  ICC 2009»
15 years 11 months ago
Secure Signaling in Next Generation Networks with NSIS
—The IETF working group Next Steps in Signaling (NSIS) develops signaling protocols for Quality-of-Service (QoS) reservations or dynamic NAT and firewall (NAT/FW) configuration...
Roland Bless, Martin Röhricht
SGAI
2007
Springer
15 years 10 months ago
Expressive security policy rules using Layered Conceptual Graphs
A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language...
Madalina Croitoru, Liang Xiao 0002, David Dupplaw,...
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
15 years 10 months ago
Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures
Information systems now form the backbone of nearly every government and private system. Increasingly these systems are networked together allowing for distributed operations, sha...
Frederick T. Sheldon, Stephen Gordon Batsell, Stac...
ISPAN
2005
IEEE
15 years 10 months ago
Secure Continuity for Sensor Networks
Addition of new nodes to a Sensor Network is a fundamental requirement for their continuity operation over time. We analyze the weakening of security due to node capture when addi...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri, Leon...