Sciweavers

948 search results - page 148 / 190
» Making a Game of Network Security
Sort
View
BROADNETS
2005
IEEE
15 years 3 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
ITCC
2005
IEEE
15 years 3 months ago
Semantic Grid - Interoperability Solution for Construction VO?
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows colla...
Ziga Turk, Matevz Dolenc, Vlado Stankovski, Etiel ...
AGENTS
2000
Springer
15 years 2 months ago
Experiments in Building Experiential Trust in a Society of Objective-Trust Based Agents
In this paper we develop a notion of “objective trust” for Software Agents, that is trust of, or between, Agents based on actual experiences between those Agents. Experiential ...
Mark Witkowski, Alexander Artikis, Jeremy Pitt
EUROCRYPT
2006
Springer
15 years 1 months ago
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Abstract. This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed ...
Kenneth G. Paterson, Arnold K. L. Yau
DBSEC
2008
188views Database» more  DBSEC 2008»
14 years 11 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray