Sciweavers

354 search results - page 42 / 71
» Key management for content access control in a hierarchy
Sort
View
86
Voted
ICAS
2009
IEEE
103views Robotics» more  ICAS 2009»
15 years 1 months ago
A Sensor-Based Approach to Symptom Recognition for Autonomic Systems
The increased complexity of today's distributed, composite, Web-based systems presents difficult and unique systems management problems. The way these systems interact, and th...
Jeffery Li, Patrick Martin, Wendy Powley, Kirk Wil...
SP
2006
IEEE
169views Security Privacy» more  SP 2006»
15 years 3 months ago
A Safety-Oriented Platform for Web Applications
The Web browser has become the dominant interface to a broad range of applications, including online banking, Web-based email, digital media delivery, gaming, and ecommerce servic...
Richard S. Cox, Steven D. Gribble, Henry M. Levy, ...
NETCOOP
2009
Springer
15 years 4 months ago
Probabilistic Analysis of Hierarchical Cluster Protocols for Wireless Sensor Networks
Wireless sensor networks are designed to extract data from the deployment environment and combine sensing, data processing and wireless communication to provide useful information ...
Ingemar Kaj
CCS
2006
ACM
15 years 1 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
WICON
2008
14 years 11 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown