Sciweavers

3638 search results - page 73 / 728
» Distribution chain security
Sort
View
117
Voted
PDCAT
2005
Springer
15 years 9 months ago
Design of a Security Management Middleware in Ubiquitous Computing Environments
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...
147
Voted
COMPSAC
2003
IEEE
15 years 8 months ago
A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks
Secure group communication in mobile ad hoc networks is often dynamic and impromptu, and thus requires efficient and automated secure group management and seamless combination of ...
Stephen S. Yau, Xinyu Zhang
CONCUR
1989
Springer
15 years 7 months ago
Using the Temporal Logic RDL for Design Specifications
In summary, RDL is an intuitionistic temporal logic for the specification of requirements and design of time-dependent systems. Coverage of RDL includes a backward chaining theore...
Dov M. Gabbay, Ian M. Hodkinson, Anthony Hunter
94
Voted
ICIP
1998
IEEE
16 years 5 months ago
A Web-based Secure System for the Distributed Printing of Documents and Images
We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. This system enables secure sharing, commerce, and co...
Ping Wah Wong, Daniel Tretter, Thomas Kite, Qian L...
121
Voted
SUTC
2006
IEEE
15 years 9 months ago
Securing Distributed Wireless Sensor Networks: Issues and Guidelines
With the emergence of ubiquitous computing the role of sensor network is becoming more important which demands highest level security and energy efficiency. In this paper we have ...
Riaz Ahmed Shaikh, Sungyoung Lee, Young Jae Song, ...