Sciweavers

579 search results - page 33 / 116
» Secure Access to Medical Data over the Internet
Sort
View
IDMS
2001
Springer
133views Multimedia» more  IDMS 2001»
15 years 6 months ago
An Access Control Architecture for Metropolitan Area Wireless Networks
This paper introduces a novel access control architecture for publicly accessible, wireless networks. The architecture was designed to address the requirements obtained from a case...
Stefan Schmid, Joe Finney, Maomao Wu, Adrian Frida...
ACSAC
2010
IEEE
14 years 11 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
WWW
2008
ACM
16 years 2 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
16 years 1 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
CCR
2002
88views more  CCR 2002»
15 years 1 months ago
Retransmission schemes for streaming internet multimedia: evaluation model and performance analysis
This paper presents a trace-driven simulation study of two classes of retransmission timeout (RTO) estimators in the context of realtime streaming over the Internet. We explore th...
Dmitri Loguinov, Hayder Radha