Sciweavers

981 search results - page 134 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
PLDI
2006
ACM
15 years 7 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
CMS
2003
171views Communications» more  CMS 2003»
15 years 2 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
CCS
2008
ACM
15 years 3 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
ESWS
2005
Springer
15 years 7 months ago
RDFSculpt: Managing RDF Schemas Under Set-Like Semantics
The Semantic Web is an extension of the current Web in which information is given well-defined meaning to support effective data discovery and integration. The RDF framework is a...
Zoi Kaoudi, Theodore Dalamagas, Timos K. Sellis
MONET
2007
194views more  MONET 2007»
15 years 1 months ago
Pervasive Healthcare and Wireless Health Monitoring
With an increasingly mobile society and the worldwide deployment of mobile and wireless networks, the wireless infrastructure can support many current and emerging healthcare appli...
Upkar Varshney