Sciweavers

826 search results - page 47 / 166
» Medical Requirements for Data Protection
Sort
View
SACMAT
2006
ACM
15 years 3 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
NCA
2008
IEEE
14 years 9 months ago
Improved transmission of vector quantized data over noisy channels
The conventional channel-optimized vector quantization (COVQ) is very powerful in the protection of vector quantization (VQ) data over noisy channels. However, it suffers from the ...
Chi-Sing Leung, John Sum, Herbert Chan
NDSS
2009
IEEE
15 years 4 months ago
Safe Passage for Passwords and Other Sensitive Data
The prevalence of malware such as keyloggers and screen scrapers has made the prospect of providing sensitive information via web pages disconcerting for security-conscious users....
Jonathan M. McCune, Adrian Perrig, Michael K. Reit...
ESSOS
2009
Springer
15 years 2 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
COMCOM
2008
104views more  COMCOM 2008»
14 years 9 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...