Sciweavers

897 search results - page 43 / 180
» Security Requirements for RFID Computing Systems
Sort
View
124
Voted
WETICE
2007
IEEE
15 years 10 months ago
Enabling Collaborative eHealth through Triplespace Computing
The design and promotion of electronic patient summaries as an instrument to facilitate the pervasive delivery of healthcare is emerging as a key technology in eHealth solutions. ...
Lyndon J. B. Nixon, Dario Cerizza, Emanuele Della ...
116
Voted
SUTC
2006
IEEE
15 years 9 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
105
Voted
ICDCSW
2007
IEEE
15 years 10 months ago
Taxonomy of Email Reputation Systems
Today a common goal in the area of email security is to provide protection from a wide variety of threats by being more predictive instead of reactive and to identify legitimate m...
Dmitri Alperovitch, Paul Judge, Sven Krasser
134
Voted
IEEESCC
2008
IEEE
15 years 10 months ago
Adaptive Secure Access to Remote Services
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RP...
Hanping Lufei, Weisong Shi, Vipin Chaudhary
CCS
2001
ACM
15 years 8 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé