Sciweavers

102
Voted
SECRYPT
2010
110views Business» more  SECRYPT 2010»
15 years 19 days ago
Techniques for Validation and Controlled Execution of Processes, Codes and Data - A Survey
Dipankar Dasgupta, Sudip Saha, Aregahegn Negatu
SECRYPT
2010
132views Business» more  SECRYPT 2010»
15 years 19 days ago
Management of Security Policies in Virtual Organisations
Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej A...
86
Voted
SECRYPT
2010
132views Business» more  SECRYPT 2010»
15 years 19 days ago
Efficient Algorithmic Safety Analysis of HRU Security Models
Anja Fischer, Winfried E. Kühnhauser
SECRYPT
2010
121views Business» more  SECRYPT 2010»
15 years 19 days ago
Risk based Access Control with Uncertain and Time-dependent Sensitivity
John A. Clark, Juan E. Tapiador, John A. McDermid,...
107
Voted
SECRYPT
2010
102views Business» more  SECRYPT 2010»
15 years 19 days ago
From Nature to Methods and Back to Nature
Petar M. Djuric
139
Voted
SECRYPT
2010
238views Business» more  SECRYPT 2010»
15 years 19 days ago
QoS and Security in Energy-harvesting Wireless Sensor Networks
Antonio Vincenzo Taddeo, Marcello Mura, Alberto Fe...
133
Voted
SECRYPT
2010
147views Business» more  SECRYPT 2010»
15 years 19 days ago
Security Models for Heterogeneous Networking
Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address t...
Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, ...
99
Voted
SECRYPT
2010
170views Business» more  SECRYPT 2010»
15 years 19 days ago
An Effective Clustering Approach to Web Query Log Anonymization
Amin Milani Fard, Ke Wang