Sciweavers

78
Voted
SIS
2008
14 years 10 months ago
New Attack Strategy for the Shrinking Generator
Pino Caballero-Gil, Amparo Fúster-Sabater, ...
101
Voted
SIS
2008
14 years 10 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
68
Voted
SIS
2008
14 years 10 months ago
Integrating Privacy Policies into Business Processes
Michele Chinosi, Alberto Trombetta
67
Voted
SIS
2008
14 years 10 months ago
A Multi-Dimensional Classification for Users of Security Patterns
Michael VanHilst, Eduardo B. Fernández, Fab...
89
Voted
SIS
2008
14 years 10 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...