Sciweavers

166 search results - page 13 / 34
» Protecting Applications with Transient Authentication
Sort
View
143
Voted
CCS
2011
ACM
14 years 3 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King
130
Voted
MOBISYS
2007
ACM
16 years 3 months ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang
140
Voted
JCM
2008
75views more  JCM 2008»
15 years 3 months ago
A Secure Mobile Agents Platform
Abstract--Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In...
Leila Ismail
157
Voted
SACMAT
2003
ACM
15 years 9 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
164
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Applications in Health Care using Public-Key Certificates and Attribute Certificates
Security infrastructures are increasingly used in the health care and welfare sector, particularly for providing security, like confidentiality, authenticity, integrity, nonrepudi...
Petra Wohlmacher, Peter Pharow