Sciweavers

981 search results - page 80 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
CSFW
2008
IEEE
15 years 8 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
15 years 6 months ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller
ACMICEC
2008
ACM
195views ECommerce» more  ACMICEC 2008»
15 years 3 months ago
DRM domain authentication using electronic payment systems
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
Imad M. Abbadi, Muntaha Alawneh
IWANN
2009
Springer
15 years 8 months ago
General Purpose Agent-Based Parallel Computing
Parallel computing has become an important research field in the last years. The availability of hardware and the success of grid computing have motivated this interest. In this pa...
David Sánchez, David Isern, Ángel Ro...
ICPR
2008
IEEE
15 years 8 months ago
Multimodal biometrics management using adaptive score-level combination
This paper presents a new evolutionary approach for adaptive combination of multiple biometrics to dynamically ensure the performance for the desired level of security. The adapti...
Ajay Kumar, Vivek Kanhangad, David Zhang