Sciweavers

2209 search results - page 201 / 442
» Language Based Secure Communication
Sort
View
ENTCS
2007
121views more  ENTCS 2007»
15 years 4 months ago
Audit-Based Access Control for Electronic Health Records
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the secu...
M. A. C. Dekker, Sandro Etalle
CD
2005
Springer
15 years 9 months ago
Deployment of Infrastructure and Services in the Open Grid Services Architecture (OGSA)
Abstract. The ability to deploy Grid infrastructure and services across organizational boundaries (rapidly, reliably, and scalably) is critical for the success of large-scale servi...
Paul Brebner, Wolfgang Emmerich
BPM
2006
Springer
149views Business» more  BPM 2006»
15 years 6 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
ICCSA
2009
Springer
15 years 11 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim
WS
2006
ACM
15 years 10 months ago
Integrity regions: authentication through presence in wireless networks
We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. ...
Srdjan Capkun, Mario Cagalj