-
2
-
-
34548769351
-
Fuzzy Multi-Level Security: An experiment on quantified risk-adaptive access control
-
DOI 10.1109/SP.2007.21, 4223227, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
P.-C. Cheng, P. Rohatgi, C. Keser, P. Karger, G. Wagner, and A. Reninger, "Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control," in Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP 2007), 2007, pp. 222-230. (Pubitemid 47432529)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 222-227
-
-
Cheng, P.-C.1
Rohatgi, P.2
Keser, C.3
Karger, P.A.4
Wagner, G.M.5
Reninger, A.S.6
-
3
-
-
33845437573
-
HORIZONTAL INTEGRATION: Broader access models for realizing information dominance
-
J. P. Office, "HORIZONTAL INTEGRATION: Broader Access Models for Realizing Information Dominance," MITRE Corporation, Special Report JSR-04-13, 2004.
-
(2004)
MITRE Corporation, Special Report JSR-04-13
-
-
Office, J.P.1
-
6
-
-
33746299517
-
COMMIT: A sender-centric truthful and energy-efficient routing protocol for ad hoc networks with selfish nodes
-
DOI 10.1109/IPDPS.2005.142, Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005
-
S. Eidenbenz, G. Resta, and P. Santi, "COMMIT: A Sender-Centric Truthful and Energy-Efficient Routing Protocol for Ad Hoc Networks with Selfish Nodes," in Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005. (Pubitemid 44101808)
-
(2005)
Proceedings - 19th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2005
, vol.2005
, pp. 1420166
-
-
Eidenbenz, S.1
Resta, G.2
Santi, P.3
-
9
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), May 2003, pp. 197-213.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003)
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
10
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
J.-P. Hubaux, L. Buttyan, and S. Capkun, "The quest for security in mobile ad hoc networks," in MobiHoc'01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, 2001, pp. 146-155.
-
(2001)
MobiHoc'01: Proceedings of the 2nd ACM International Symposium on Mobile Ad hoc Networking & Computing
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyan, L.2
Capkun, S.3
-
11
-
-
0033357103
-
Securing ad hoc networks
-
DOI 10.1109/65.806983
-
L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network, vol.13, no. 6, pp. 24-30, 1999. (Pubitemid 30526484)
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
12
-
-
84943807207
-
Toward secure key distribution in truly ad-Hoc networks
-
A. Khalili, J. Katz, and W. Arbaugh, "Toward Secure Key Distribution in Truly Ad-Hoc Networks," in Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 2003, pp. 342-346.
-
(2003)
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003)
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.3
|