Sciweavers

6137 search results - page 231 / 1228
» Securing Collaborative Applications
Sort
View
121
Voted
IFIP
2010
Springer
15 years 1 months ago
Active Ageing Roadmap - A Collaborative Networks Contribution to Demographic Sustainability
The application of the collaborative networks paradigm, and a new generation of collaboration-support platforms and tools, is a promising approach to supporting active ageing, and ...
Luis M. Camarinha-Matos, Hamideh Afsarmanesh
133
Voted
DCOSS
2005
Springer
15 years 8 months ago
Design of Adaptive Overlays for Multi-scale Communication in Sensor Networks
In wireless sensor networks, energy and communication bandwidth are precious resources. Traditionally, layering has been used as a design principle for network stacks; hence routin...
Santashil PalChaudhuri, Rajnish Kumar, Richard G. ...
ESORICS
2009
Springer
16 years 3 months ago
Secure Ownership and Ownership Transfer in RFID Systems
We present a formal model for stateful security protocols. This model is used to define ownership and ownership transfer as concepts as well as security properties. These definitio...
Ton van Deursen, Sjouke Mauw, Sasa Radomirovic, Pi...
158
Voted
HICSS
2010
IEEE
487views Biometrics» more  HICSS 2010»
15 years 9 months ago
A Survey of Game Theory as Applied to Network Security
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two de...
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipank...
163
Voted
TRUSTBUS
2007
Springer
15 years 8 months ago
Securing VO Management
Abstract. In this paper we propose a security architecture and mechanism for Virtual Organizations (VO) for businesses. The VOs we consider are based on web service technology to a...
Florian Kerschbaum, Rafael Deitos, Philip Robinson