The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Framework for Secure Information Management in Critical Systems
|
Author(s): Rajgopal Kannan (Louisiana State University, USA), S. Sitharama Iyengar (Louisiana State University, USA)and A. Durressi (Louisiana State University, USA)
Copyright: 2006
Pages: 23
Source title:
Web and Information Security
Source Author(s)/Editor(s): Elena Ferrari (University of Insubria at Como, Italy)and Bhavani Thuraisingham (The University of Texas at Dallas, USA)
DOI: 10.4018/978-1-59140-588-7.ch012
Purchase
|
Abstract
The techniques described in this chapter will develop an understanding of three critical areas in sensor network security, namely, data confidentiality, anonymity, and integrity along with associated security-performance tradeoffs. These results should contribute toward the design of a security framework for a common sensornet architecture and enable the flexible deployment and use of sensor networks for a large variety of applications, including homeland security.
Related Content
Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini.
© 2024.
14 pages.
|
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
30 pages.
|
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan.
© 2024.
19 pages.
|
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi.
© 2024.
14 pages.
|
Meryeme Bououchma, Brahim Herrou.
© 2024.
14 pages.
|
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
16 pages.
|
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly.
© 2024.
10 pages.
|
|
|