Sciweavers

579 search results - page 30 / 116
» Secure Access to Medical Data over the Internet
Sort
View
SIS
2008
15 years 2 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
117
Voted
SAINT
2005
IEEE
15 years 7 months ago
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture ...
Antonio Corradi, Rebecca Montanari, Daniela Tibald...
CORR
2010
Springer
132views Education» more  CORR 2010»
14 years 11 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
CORR
2006
Springer
115views Education» more  CORR 2006»
15 years 1 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
EDBT
2006
ACM
129views Database» more  EDBT 2006»
16 years 1 months ago
Querying Mediated Geographic Data Sources
With the proliferation of geographic data and resources over the Internet, there is an increasing demand for integration services that allow a transparent access to massive reposit...
Abdelkader Bétari, François-Marie Co...