Sciweavers

445 search results - page 72 / 89
» Authorization and Access Control in IRO-DB
Sort
View
FTDCS
1997
IEEE
15 years 1 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
ICCCN
2007
IEEE
15 years 1 months ago
Principles of IEEE 802.11s
In 2003, interests in the Institute of Electronics and Electrical Engineering (IEEE) 802.11 Working Group (WG) led to the formation of Task Group (TG) "s". 802.11s develo...
Guido R. Hiertz, Sebastian Max, Rui Zhao, Dee Dent...
JSW
2008
240views more  JSW 2008»
14 years 9 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
88
Voted
PRESENCE
1998
98views more  PRESENCE 1998»
14 years 9 months ago
The Virtual Venue: User-Computer Interaction in Information-Rich Virtual Environments
We present a virtual environment application that allows users to access embedded information within an immersive virtual space. Due to the richness and complexity of this environ...
Doug A. Bowman, Larry F. Hodges, Jay David Bolter
TWC
2008
154views more  TWC 2008»
14 years 9 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...