Sciweavers

3349 search results - page 139 / 670
» Data Security
Sort
View
SAC
2009
ACM
15 years 8 months ago
Towards developing a trust-based security solution
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small...
Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Shari...
117
Voted
DEXAW
2009
IEEE
102views Database» more  DEXAW 2009»
15 years 7 months ago
A Pattern for Secure Graphical User Interface Systems
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
CCS
2009
ACM
15 years 10 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
15 years 10 months ago
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
Christopher Hecker, Brian Hay
109
Voted
IANDC
2008
140views more  IANDC 2008»
15 years 3 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi