Sciweavers

1597 search results - page 3 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
160
Voted
CODASPY
2011
14 years 1 months ago
The challenge of data and application security and privacy (DASPY): are we up to it
This talk gives a personal perspective on the topic area of this new conference on data and application security and privacy, the difficult nature of the challenge we are confron...
Ravi S. Sandhu
TDSC
2011
14 years 4 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
INFOCOM
2008
IEEE
15 years 3 months ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang
ACSAC
1999
IEEE
15 years 1 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
PST
2004
14 years 10 months ago
Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges
Driven by the ubiquitous deployment of mobile systems, the widespread use of the Internet, the rapid advances in wireless technologies, the insatiable demand for high-speed interac...
Ali Grami, Bernadette Schell