Sciweavers

1183 search results - page 67 / 237
» On flow-sensitive security types
Sort
View
136
Voted
ISPA
2005
Springer
15 years 10 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
203
Voted
IAW
2003
IEEE
15 years 9 months ago
Insecure Programming: How Culpable is a Language's Syntax?
— Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writin...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
TRUSTBUS
2009
Springer
15 years 11 months ago
Advanced Features in Bayesian Reputation Systems
Abstract. Bayesian reputation systems are quite flexible and can relatively easily be adapted to different types of applications and environments. The purpose of this paper is to ...
Audun Jøsang, Walter Quattrociocchi
EUPROJECTS
2005
Springer
15 years 10 months ago
Patients and EHRs Tele Home Monitoring Reference Scenario
This scenario focuses on patients as users of Electronic Health Records (EHR) relevant information. The concrete field of applications is telemonitoring at home, a field where many...
Michael Pieper, Karl Stroetmann
FSTTCS
2005
Springer
15 years 10 months ago
Non-disclosure for Distributed Mobile Code
Abstract. This paper addresses the issue of confidentiality and declassification for global computing in a language-based security perspective. The purpose is to deal with new fo...
Ana Almeida Matos