Sciweavers

219 search results - page 21 / 44
» Securing Sensor Networks Using A Novel Multi-Channel Archite...
Sort
View
SUTC
2008
IEEE
15 years 6 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
TMC
2012
13 years 2 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
CORR
2010
Springer
175views Education» more  CORR 2010»
14 years 11 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
IDMS
2001
Springer
133views Multimedia» more  IDMS 2001»
15 years 4 months ago
An Access Control Architecture for Metropolitan Area Wireless Networks
This paper introduces a novel access control architecture for publicly accessible, wireless networks. The architecture was designed to address the requirements obtained from a case...
Stefan Schmid, Joe Finney, Maomao Wu, Adrian Frida...
ICRA
2003
IEEE
166views Robotics» more  ICRA 2003»
15 years 5 months ago
A service-based network architecture for wearable robots
We are developing a network architecture for our novel robot concept of wearable robot. Wearable robots are mobile information devices capable of supporting remote communication a...
Ka Keung Lee, Ping Zhang, Yangsheng Xu