Sciweavers

12478 search results - page 190 / 2496
» Secure Interaction Design
Sort
View
CHI
2007
ACM
16 years 4 months ago
Who killed design?: addressing design through an interdisciplinary investigation
ended abstract describes the grounding for an interdisciplinary discussion regarding the contemporary meaning of "Design", "Designer", and "Designed"...
Scott Pobiner, Anijo Punnen Mathew
FOSAD
2009
Springer
15 years 10 months ago
Logic in Access Control (Tutorial Notes)
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and t...
Martín Abadi
WCNC
2008
IEEE
15 years 10 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
SASN
2004
ACM
15 years 9 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner
ZUM
2000
Springer
15 years 7 months ago
Formal Methods for Industrial Products
We have recently completed the specication and security proof of a large, industrial scale application. The application is security critical, and the modelling and proof were done ...
Susan Stepney, David Cooper