Sciweavers

1748 search results - page 293 / 350
» Security Models for Heterogeneous Networking
Sort
View
FGCN
2008
IEEE
144views Communications» more  FGCN 2008»
15 years 9 months ago
A Novel Approach for Infrastructure Deployment for VANET
In last decade intelligent transportation systems (ITS) and vehicular ad hoc network (VANET) became one of the most active and emerging fields of research. It is expected that thi...
Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-hoon ...
AINA
2007
IEEE
15 years 9 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
DSN
2005
IEEE
15 years 9 months ago
Towards a Theory of Insider Threat Assessment
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Sham...
GCC
2004
Springer
15 years 8 months ago
XML Based X.509 Authorization in CERNET Grid
: This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-graine...
Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping R...
AINA
2010
IEEE
15 years 8 months ago
Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each oth...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...