Sciweavers

SIS
2008
15 years 24 days ago
New Attack Strategy for the Shrinking Generator
Pino Caballero-Gil, Amparo Fúster-Sabater, ...
SIS
2008
15 years 24 days ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
SIS
2008
15 years 24 days ago
A Multi-Dimensional Classification for Users of Security Patterns
Michael VanHilst, Eduardo B. Fernández, Fab...
SIS
2008
15 years 24 days ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...