Zobrazeno 1 - 10
of 46
pro vyhledávání: '"Ben Othmane, L."'
Publikováno v:
Wireless sensor and mobile adhoc networks : vehicular and space applications, 217-247
STARTPAGE=217;ENDPAGE=247;TITLE=Wireless sensor and mobile adhoc networks : vehicular and space applications
Wireless Sensor and Mobile Ad-Hoc Networks ISBN: 9781493924677
STARTPAGE=217;ENDPAGE=247;TITLE=Wireless sensor and mobile adhoc networks : vehicular and space applications
Wireless Sensor and Mobile Ad-Hoc Networks ISBN: 9781493924677
Electronic control units (ECUs) of a vehicle control the behavior of its devices—e.g., break and engine. They communicate through the in-vehicle network. Vehicles communicate with other vehicles and road side units (RSUs) through vehicular ad-hoc n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8dba6897cd3bfb4f5050383e102c21a9
https://research.tue.nl/nl/publications/494d38d9-86e0-4045-b12a-e22a0cb1ffc7
https://research.tue.nl/nl/publications/494d38d9-86e0-4045-b12a-e22a0cb1ffc7
Publikováno v:
3rd IEEE International Advance Computing Conference (IACC, Ghaziabad, India, February 22-23, 2013), 1636-1640
STARTPAGE=1636;ENDPAGE=1640;TITLE=3rd IEEE International Advance Computing Conference (IACC, Ghaziabad, India, February 22-23, 2013)
STARTPAGE=1636;ENDPAGE=1640;TITLE=3rd IEEE International Advance Computing Conference (IACC, Ghaziabad, India, February 22-23, 2013)
Modern organizations interact with their partners through digital supply chain business processes for producing and delivering products and services to consumers. A partner in this supply chain can be a sub-contractor to whom work is outsourced. Each
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b9e0e6083bb0e15e86b448dbe911c3c6
https://research.tue.nl/nl/publications/f3ed6ce0-c558-4069-9d5a-71b02f0fef74
https://research.tue.nl/nl/publications/f3ed6ce0-c558-4069-9d5a-71b02f0fef74
The agile software development approach makes developing secure software challenging. Existing approaches for extending the agile development process, which enables incremental and iterative software development, fall short of providing a method for
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::2cc2bca2637d585d9bc0b6098df32a91
https://research.tue.nl/nl/publications/00844de9-4b91-411a-b10b-8c330bf5b8e1
https://research.tue.nl/nl/publications/00844de9-4b91-411a-b10b-8c330bf5b8e1
Autor:
Ben Othmane, L., Weffers, H.T.G., Ranchal, R., Angin, P., Bhargava, B., Mohamad, M.M., Janczewski, L.J., Wolfe, H.B., Shenoi, S.
Publikováno v:
Security and Privacy Protection in Information Processing Systems ISBN: 9783642392177
SEC
Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013, 391-404
STARTPAGE=391;ENDPAGE=404;TITLE=Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013
SEC
Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013, 391-404
STARTPAGE=391;ENDPAGE=404;TITLE=Security and privacy protection in information processing systems : 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013
Information and communication technology systems, such as remote health care monitoring and smart mobility applications, have become indispensable parts of our lives. Security vulnerabilities in these systems could cause financial losses, privacy/saf
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::eb2abda8d8d3eb3dbf81444a0a95b868
https://doi.org/10.1007/978-3-642-39218-4_29
https://doi.org/10.1007/978-3-642-39218-4_29
Publikováno v:
Proceedings of the 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2012, San Diego CA, USA, May 21-24, 2012), 1-4
STARTPAGE=1;ENDPAGE=4;TITLE=Proceedings of the 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2012, San Diego CA, USA, May 21-24, 2012)
STARTPAGE=1;ENDPAGE=4;TITLE=Proceedings of the 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2012, San Diego CA, USA, May 21-24, 2012)
We propose a solution that provides protection for patients' electronic health/medical records disseminated among different authorized healthcare information systems. The solution is known as Active Bundles using a Trusted Third Party (ABTTP). It is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2f5d6bc7a62efcb33cf1db5733b7ca19
https://doi.org/10.4108/icst.pervasivehealth.2012.248719
https://doi.org/10.4108/icst.pervasivehealth.2012.248719
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2010 29th IEEE Symposium on Reliable Distributed Systems; 2010, p177-183, 7p
Autor:
Ben Othmane, L., Lilien, L.
Publikováno v:
2009 World Congress on Privacy, Security, Trust & the Management of e-Business; 2009, p202-213, 12p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.