Now showing items 11-17 of 17
Security management for mobile ad hoc network of networks (MANoN).
(IGI Publishing, 2010)
An Observation Model to Detect Security Violations in Web Services Environment
Growing violation activity makes monitoring of information technology resource systems day by day necessity. As a matter of importance, the popularity of surveillance systems increases with its associated systems. The ...
Access control mechanism for mobile ad hoc network of networks.
(IEEE Computer Society, 2010-03)
The Calculus of context-aware ambients.
We present the Calculus of Context-aware Ambients (CCA in short) for the modelling and verification of mobile systems that are context-aware. This process calculus is built upon the calculus of mobile ambients and introduces ...
Deriving enforcement mechanisms for policies
Dynamic Access Control Policies - Specification and Verification
(Oxford University Press, 2012)
Security requirements deal with the protection of assets against unauthorized access (disclosure or modification) and their availability to authorized users. Temporal constraints of history-based access control policies ...