Sciweavers

3349 search results - page 103 / 670
» Data Security
Sort
View
FGCN
2008
IEEE
196views Communications» more  FGCN 2008»
15 years 10 months ago
SS-RBAC: Secure Query Processing Model for Semantic Sensor Networks
This paper proposes a novel secure query processing model for semantic sensor networks. A semantic sensor network (SSN) is a sensor network which includes semantics of sensory dat...
Dongwon Jeong, Hyejin Jeong, Young-Sik Jeong
44
Voted
IBMRD
2007
47views more  IBMRD 2007»
15 years 3 months ago
Cell Broadband Engine processor vault security architecture
    Current data protection technologies such as those based on public‐key encryption and broadcast  encryption  focus  on  the  secure  control  and  prote...
Kanna Shimizu, H. Peter Hofstee, John S. Liberty
120
Voted
ICCCN
2007
IEEE
15 years 9 months ago
Interplay of Security and Reliability using Non-uniform Checkpoints
Real time applications such as military aircraft flight control systems and online banking are critical with respect to security and reliability. In this paper we presented a way ...
Kiranmai Bellam, Raghava K. Vudata, Xiao Qin, Zili...
128
Voted
IEEEARES
2008
IEEE
15 years 9 months ago
A Security Model and its Application to a Distributed Decision Support System for Healthcare
A distributed decision support system involving multiple clinical centres is crucial to the diagnosis of rare diseases. Although sharing of valid diagnosed cases can facilitate la...
Liang Xiao 0002, Javier Vicente, Carlos Sáe...
ISVC
2007
Springer
15 years 9 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano