Sciweavers

445 search results - page 78 / 89
» Authorization and Access Control in IRO-DB
Sort
View
ICPADS
2008
IEEE
15 years 4 months ago
An Efficient Policy System for Body Sensor Networks
Body sensor networks (BSNs) have become a promising technology for healthcare, in which biosensors continuously monitor physiological parameters of a user. Distinct from conventio...
Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil Lu...
IEEEIAS
2008
IEEE
15 years 4 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina
ACSAC
2007
IEEE
15 years 4 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth
OTM
2007
Springer
15 years 3 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
72
Voted
SIGCSE
2005
ACM
125views Education» more  SIGCSE 2005»
15 years 3 months ago
Efficient use of robots in the undergraduate curriculum
In this paper we describe how a single Khepera II robot was used for an assignment in a senior level course on graphical user interface implementation. The assignment required eac...
Judith Challinger