Securing Multihop Vehicular Message Broadcast using Trust Sensors

M Gerlach, O Mylyy, N Mariyasagayam… - … Annual Mediterranean Ad …, 2008 - Springer
The ad hoc wireless exchange of position and velocity information between vehicles
enables a plethora of new applications that can increase the safety and efficiency of driving …

An Analysis of and Perspective on the Information Security Maturity Model: a case study of a Public and a Private Sector Company

L Silva, T Poleto, J Moura, A Paula Costa - 2012 - aisel.aisnet.org
Abstract Information Security (IS) is a concept that is related to protecting a set of data in
order to preserve the value it has for an individual or an organization. A review of the …

[PDF][PDF] Detecting inconsistencies of mixed secrecy models and business policies

W Hassan, L Logrippo - University of Ottawa, Canada, Technical …, 2009 - academia.edu
Several secrecy models are known in practice, and governance requirements may make it
necessary to combine them in order to implement the secrecy policies of an enterprise …

Security made easy: Achieving user-friendly communication protection in ad-hoc situations

J Heider, J Schutte - The International Conference on …, 2007 - ieeexplore.ieee.org
Mobile applications dealing with ad-hoc situations do have their own challenges such as a
reasonable short time for interaction and limitations of available technology. A secure yet …

PHD A Generic and Flexible Architecture for IPTV in Authorized Domains

MA Simplício Jr, V Coroama… - 2009 International …, 2009 - ieeexplore.ieee.org
As TV consumers expect a growing quantity and quality of services provided to them, and
providers fear uncontrolled distribution of the digital content, one of the more promising …

Security for Context-Aware ad-hoc Networking Applications

Y Venturini, V Coroama, TCMB Carvalho… - … Mediterranean Ad Hoc …, 2008 - Springer
With the rapid spreading of ubiquitous computing applications, the importance of security
concepts coping with their needs is also growing. While the possible application areas are …

[引用][C] A relational logic approach for representing secrecy models and detecting their inconsistencies Δ ɷ

W Hassan