Sciweavers

12637 search results - page 244 / 2528
» Security for Extensible Systems
Sort
View
HASE
2008
IEEE
15 years 11 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
FLAIRS
2008
15 years 7 months ago
Granular Logic with Variables for Implementation of Extended Tabular Trees
This paper presents proposals of certain extensions to the XTT knowledge representation model, a method of tabular specification for rule-based systems. The extensions concern
Antoni Ligeza, Grzegorz J. Nalepa
139
Voted
FGCN
2008
IEEE
196views Communications» more  FGCN 2008»
15 years 11 months ago
SS-RBAC: Secure Query Processing Model for Semantic Sensor Networks
This paper proposes a novel secure query processing model for semantic sensor networks. A semantic sensor network (SSN) is a sensor network which includes semantics of sensory dat...
Dongwon Jeong, Hyejin Jeong, Young-Sik Jeong
143
Voted
WETICE
1998
IEEE
15 years 9 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
111
Voted
OOPSLA
1992
Springer
15 years 9 months ago
Concurrency Annotations
JAC is a Java extension for high-level concurrent programming, meant to hide the notions of threads and synchronization statements from the programmer. Putting into practice the c...
Klaus-Peter Löhr