-
2
-
-
55249124933
-
-
Bell, D.E., LaPadula, L.J., 1975. Secure computer systems: unified exposition and multics interpretation. Tech. Rep. MTR-2997, MITRE Corp., Bedford, MA.
-
Bell, D.E., LaPadula, L.J., 1975. Secure computer systems: unified exposition and multics interpretation. Tech. Rep. MTR-2997, MITRE Corp., Bedford, MA.
-
-
-
-
3
-
-
55249110543
-
-
Benenson, Z., Gedicke, N., Raivio, O., 2005. Realizing robust user.
-
Benenson, Z., Gedicke, N., Raivio, O., 2005. Realizing robust user.
-
-
-
-
4
-
-
55249103310
-
-
Biba, K.J., 1977. Integrity considerations for secure computer systems. Tech. Rep. MTR-3153, MITRE Corp., Bedford, MA.
-
Biba, K.J., 1977. Integrity considerations for secure computer systems. Tech. Rep. MTR-3153, MITRE Corp., Bedford, MA.
-
-
-
-
6
-
-
55249092637
-
-
Crossbow, 2007. MICA2 Datasheet. Crossbow Technology Incorporated, 4145 N. First Street, San Jose, CA 95134. .
-
Crossbow, 2007. MICA2 Datasheet. Crossbow Technology Incorporated, 4145 N. First Street, San Jose, CA 95134. .
-
-
-
-
7
-
-
84944048132
-
The ponder policy specification language
-
Workshop on Policies for Distributed Systems and Networks, Springer-Verlag, Bristol, UK
-
Damianou N., Dulay N., Lupu E., and Sloman M. The ponder policy specification language. Workshop on Policies for Distributed Systems and Networks. LNCS 1995 (2001), Springer-Verlag, Bristol, UK 18-39
-
(2001)
LNCS 1995
, pp. 18-39
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
8
-
-
4544301464
-
Random key-assignment for secure wireless sensor networks
-
ACM Press, New York NY, USA
-
Di Pietro R., Mancini L.V., and Mei A. Random key-assignment for secure wireless sensor networks. SASN'03: Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks (2003), ACM Press, New York NY, USA 62-71
-
(2003)
SASN'03: Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks
, pp. 62-71
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
-
9
-
-
38149102619
-
-
Donggang, Liu, 2007. Efficient and distributed access control for sensor networks. In: Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), Santa Fe, NM. pp. 21-35.
-
Donggang, Liu, 2007. Efficient and distributed access control for sensor networks. In: Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), Santa Fe, NM. pp. 21-35.
-
-
-
-
10
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
IEEE Computer Society, Washington, DC, USA
-
Gaubatz G., Kaps J.-P., Öztürk E., and Sunar B. State of the art in ultra-low power public key cryptography for wireless sensor networks. PERCOMW'05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops (2005), IEEE Computer Society, Washington, DC, USA 146-150
-
(2005)
PERCOMW'05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.-P.2
Öztürk, E.3
Sunar, B.4
-
11
-
-
0030677524
-
-
Jajodia, S., Samarati, P., Subrahmanian, V., 1997. A logical language for expressing authorizations. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy. IEEE, INSPEC Accession Number: 5602909. pp. 31-42.
-
Jajodia, S., Samarati, P., Subrahmanian, V., 1997. A logical language for expressing authorizations. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy. IEEE, INSPEC Accession Number: 5602909. pp. 31-42.
-
-
-
-
14
-
-
55249124230
-
-
Oliveira, L.B., Aranha, D., Morais, E., Daguano, F., López, J., Dahab, R., 2007. Tinytate: Identity-based encryption for sensor networks. Cryptology ePrint Archive, Report 2007/020.
-
Oliveira, L.B., Aranha, D., Morais, E., Daguano, F., López, J., Dahab, R., 2007. Tinytate: Identity-based encryption for sensor networks. Cryptology ePrint Archive, Report 2007/020.
-
-
-
-
15
-
-
55249096873
-
-
Perrig, A., Canetti, R., Song, D., Tygar, J.D., 2001. Efficient and secure source authentication for multicast. In: Proceedings of the Internet Society Network and Distributed System Security Symposium, NDSS'01. pp. 35-46.
-
Perrig, A., Canetti, R., Song, D., Tygar, J.D., 2001. Efficient and secure source authentication for multicast. In: Proceedings of the Internet Society Network and Distributed System Security Symposium, NDSS'01. pp. 35-46.
-
-
-
-
16
-
-
33746086383
-
-
Wang, H., Li, Q., 2006. Distributed user access control in sensor networks. In: Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), San Francisco, CA. pp. 305-320.
-
Wang, H., Li, Q., 2006. Distributed user access control in sensor networks. In: Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), San Francisco, CA. pp. 305-320.
-
-
-
-
18
-
-
33750012404
-
Access control in wireless sensor networks
-
Zhou Y., Zhang Y., and Fang Y. Access control in wireless sensor networks. Ad Hoc Networks 5 1 (2007) 3-13
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 3-13
-
-
Zhou, Y.1
Zhang, Y.2
Fang, Y.3
|