Sciweavers

1587 search results - page 177 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
96
Voted
EIT
2008
IEEE
15 years 15 hour ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
SASO
2008
IEEE
15 years 4 months ago
Determining Object Safety Using a Multiagent, Collaborative System
We consider the problem of Object Safety: how objects endowed with processing, communication, and sensing capabilities can determine their safety. We assign an agent to each objec...
Brian Quanz, Costas Tsatsoulis
IHI
2012
217views Healthcare» more  IHI 2012»
13 years 5 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
ECR
2010
129views more  ECR 2010»
14 years 10 months ago
The design of a reliable reputation system
Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse user populations spread across numerous administrative and security domains. Zero...
Gayatri Swamynathan, Kevin C. Almeroth, Ben Y. Zha...
82
Voted
SACMAT
2005
ACM
15 years 3 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li