Sciweavers

3821 search results - page 670 / 765
» A Security Model for Aglets
Sort
View
131
Voted
SPC
2005
Springer
15 years 6 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
ACNS
2004
Springer
128views Cryptology» more  ACNS 2004»
15 years 6 months ago
A Novel Framework for Alert Correlation and Understanding
Abstract. We propose a novel framework named Hidden Colored PetriNet for Alert Correlation and Understanding (HCPN-ACU) in intrusion detection system. This model is based upon the ...
Dong Yu, Deborah A. Frincke
102
Voted
GISCIENCE
2004
Springer
144views GIS» more  GISCIENCE 2004»
15 years 6 months ago
Landmarks in the Communication of Route Directions
We investigate the understanding of landmarks using a model of embedding procedures that sees affordances established on three levels. On the first level there are landmark experie...
Elisabeth Weissensteiner, Stephan Winter
107
Voted
ICDCIT
2004
Springer
15 years 6 months ago
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions
The need to securely share information on an ad-hoc basis between collaborating entities is increasingly becoming important. We propose a coalition based access control model (CBAC...
Vijayalakshmi Atluri, Janice Warner
125
Voted
POLICY
2004
Springer
15 years 6 months ago
Policy Based Management for Internet Communities
Policy Based Management (PBM) is a research topic that has been driven by the tremendous complexity inherent in the administration and management of present-day networking and tel...
Kevin Chekov Feeney, David Lewis, Vincent P. Wade