Sciweavers

617 search results - page 25 / 124
» Research Challenges for the Security of Control Systems
Sort
View
OOPSLA
2005
Springer
15 years 5 months ago
Using predicate fields in a highly flexible industrial control system
Predicate fields allow an object’s structure to vary at runtime based on the object’s state: a predicate field is present or not, depending on the values of other fields. P...
Shay Artzi, Michael D. Ernst
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
15 years 8 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
CONSTRAINTS
2008
107views more  CONSTRAINTS 2008»
14 years 12 months ago
A Constraint-Based Autonomous 3D Camera System
Camera control techniques for Interactive Digital Entertainment (IDE) are reaching their limits in terms of capabilities. To enable future growth, new methods must be derived to a...
Owen Bourne, Abdul Sattar, Scott D. Goodwin
OTM
2005
Springer
15 years 5 months ago
Balancing Flexibility and Security in Adaptive Process Management Systems
Abstract. Process–aware information systems (PAIS) must provide sufficient flexibility to their users to support a broad spectrum of application scenarios. As a response to thi...
Barbara Weber, Manfred Reichert, Werner Wild, Stef...
WMASH
2003
ACM
15 years 5 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...