Search Results - "Itani, W."
-
1
Quantum computing for fluids: Where do we stand?
Published in Europhysics letters (01-10-2023)“…We present a pedagogical introduction to the current state of quantum computing algorithms for the simulation of classical fluids. Different strategies, along…”
Get full text
Journal Article -
2
J2ME end-to-end security for M-commerce
Published in 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003 (2003)“…This paper shows an end-to-end application-layer security solution for wireless enterprise applications using the Java 2 Platform Micro Edition (J2ME). The…”
Get full text
Conference Proceeding -
3
Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices
Published in First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05) (2005)“…This paper presents PATRIOT (Policy-bAsed, mulTi-level secuRIty prOTocol), an optimized, policy-driven security architecture for protecting the confidentiality…”
Get full text
Conference Proceeding -
4
SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications
Published in IEEE International Conference on Performance, Computing, and Communications, 2004 (2004)“…This paper presents SPECSA, a new, optimized, policy-driven security architecture for wireless enterprise applications. SPECSA is scalable, extensible,…”
Get full text
Conference Proceeding -
5
J2ME application-layer end-to-end security for m-commerce
Published in Journal of network and computer applications (2004)“…This paper shows an end-to-end application-layer security solution for wireless enterprise applications using the Java 2 Platform Micro Edition (J2ME). The…”
Get full text
Journal Article -
6
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…In this paper we present PasS (privacy as a service); a set of security protocols for ensuring the privacy and legal compliance of customer data in cloud…”
Get full text
Conference Proceeding -
7
SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications
Published in Computer communications (01-12-2004)“…This paper presents SPECSA, a new, optimized, policy-driven security architecture for wireless enterprise applications. SPECSA is scalable, extensible,…”
Get full text
Journal Article -
8
Energy-efficient incremental integrity for securing storage in mobile cloud computing
Published in 2010 International Conference on Energy Aware Computing (01-12-2010)“…We present an energy-efficient protocol for ensuring the integrity of storage services in mobile cloud computing. The proposed protocol applies the concepts of…”
Get full text
Conference Proceeding -
9
Secure delay-tolerant communications in the presence of oppressive governments
Published in 2011 International Conference for Internet Technology and Secured Transactions (01-12-2011)“…In this paper, we attempt to develop a secure delay-tolerant network system that enables citizens to communicate freely in an environment where public…”
Get full text
Conference Proceeding -
10
Energy-efficient platform-as-a-service security provisioning in the cloud
Published in 2011 International Conference on Energy Aware Computing (01-11-2011)“…In this paper we present ENUAGE, a platform as a service security framework for provisioning secure and scalable multi-layered services based on the cloud…”
Get full text
Conference Proceeding -
11
Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System
Published in 2012 19th International Conference on Telecommunications (ICT) (01-04-2012)“…The Domain Name System is a crucial part of the Internet's infrastructure, as it provides basic information that is vital for the proper operation of the…”
Get full text
Conference Proceeding -
12
SINE: Cache-friendly integrity for the web
Published in 2009 5th IEEE Workshop on Secure Network Protocols (01-10-2009)“…In this paper we present SINE, a cache-friendly protocol for integrity-enforced web documents. SINE operates by decoupling integrity from confidentiality and…”
Get full text
Conference Proceeding -
13
NISp1-09: PRIDE: Policy-Driven Web Security for Handheld Wireless Devices
Published in IEEE Globecom 2006 (01-11-2006)“…In this paper we present PRIDE (Policy-driven web secuRity for handheld wireless DEvices) as an efficient security architecture for assuring the…”
Get full text
Conference Proceeding -
14
SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks
Published in 2010 IEEE Global Telecommunications Conference GLOBECOM 2010 (01-12-2010)“…We present SinPack, a security protocol for preventing packet pollution attacks in network-coded content distribution networks. SinPack employs a…”
Get full text
Conference Proceeding -
15
Formal approaches to requirements engineering: from behavior trees to alloy
Published in Canadian Conference on Electrical and Computer Engineering, 2005 (2005)“…Requirements modeling is receiving a good deal of attention from the software engineering community. However, the lack of formal representation and tool…”
Get full text
Conference Proceeding -
16
SECERN: A Secure Enterprise Backup and Recovery System for Mission-Critical Relational Database Servers
Published in 2006 Innovations in Information Technology (01-11-2006)“…In this paper we present SECERN, a secure enterprise backup and recovery system for mission-critical relational database servers. SECERN operates on the…”
Get full text
Conference Proceeding