Sciweavers

579 search results - page 48 / 116
» Secure Access to Medical Data over the Internet
Sort
View
EDBTW
2006
Springer
15 years 3 months ago
Query Translation for XPath-Based Security Views
Abstract. Since XML is used as a storage format in an increasing number of applications, security has become an important issue in XML databases. One aspect of security is restrict...
Roel Vercammen, Jan Hidders, Jan Paredaens
ICWS
2004
IEEE
15 years 2 months ago
JClarens: A Java Based Interactive Physics Analysis Environment for Data Intensive Applications
In this paper we describe JClarens; a Java based implementation of the Clarens remote data server. JClarens provides web services for an interactive analysis environment to dynami...
Arshad Ali, Ashiq Anjum, Tahir Azim, Michael Thoma...
CN
2002
87views more  CN 2002»
15 years 1 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
IMC
2007
ACM
15 years 3 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
WS
2004
ACM
15 years 7 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...