Sciweavers

6555 search results - page 1099 / 1311
» Secure attribute-based systems
Sort
View
141
Voted
ICSOC
2003
Springer
15 years 8 months ago
Disconnected Operation Service in Mobile Grid Computing
Abstract. In this paper, we discuss on the extension of grid computing systems in mobile computing environments, where mobile devices can be effectively incorporated into the grid ...
Sang-Min Park, Young-Bae Ko, Jai-Hoon Kim
149
Voted
ISI
2003
Springer
15 years 8 months ago
COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement
Abstract. In this paper, we report our work on developing and evaluating a prototype system aimed at addressing the information monitoring and sharing challenges in the law enforce...
Daniel Dajun Zeng, Hsinchun Chen, Damien Daspit, F...
123
Voted
DATE
2010
IEEE
141views Hardware» more  DATE 2010»
15 years 8 months ago
An embedded platform for privacy-friendly road charging applications
—Systems based on satellite localization are enabling new scenarios for road charging schemes by offering the possibility to charge drivers as a function of their road usage. An ...
Josep Balasch, Ingrid Verbauwhede, Bart Preneel
138
Voted
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
15 years 8 months ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
115
Voted
HAIS
2010
Springer
15 years 8 months ago
Incorporating Temporal Constraints in the Planning Task of a Hybrid Intelligent IDS
Abstract. Accurate and swift responses are crucial to Intrusion Detection Systems (IDSs), especially if automatic abortion mechanisms are running. In keeping with this idea, this w...
Álvaro Herrero, Martí Navarro, Vicen...
« Prev « First page 1099 / 1311 Last » Next »