Sciweavers

2560 search results - page 207 / 512
» Securing VO Management
Sort
View
150
Voted
ADHOCNOW
2008
Springer
15 years 11 months ago
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks
The development of Wireless Body Area Networks (WBANs) for wireless sensing and monitoring of a person’s vital functions, is an enabler in providing better personal health care w...
Dave Singelée, Benoît Latré, B...
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
15 years 9 months ago
Security when people matter: structuring incentives for user behavior
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives p...
Rick Wash, Jeffrey K. MacKie-Mason
CAISE
2006
Springer
15 years 8 months ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
CSREASAM
2004
15 years 6 months ago
A Unified Framework for Mobile Device Security
: Present-day handheld devices, such as PDAs, are a useful blend of hardware and software oriented toward the mobile workforce. While they provide the capability to review document...
Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev
145
Voted
IC
2004
15 years 6 months ago
A Web Interface for Nessus Network Security Scanner
A fully functional web interface (NessusWeb) for the Nessus network security scanner has been developed. NessusWeb provides public accessibility for authorized users and supports ...
Chuming Chen, Manton M. Matthews