Skip to main content

and
  1. No Access

    Article

    Automatic evaluation of information provider reliability and expertise

    Q&A social media have gained a lot of attention during the recent years. People rely on these sites to obtain information due to a number of advantages they offer as compared to conventional sources of knowled...

    Konstantinos Pelechrinis, Vladimir Zadorozhny, Velin Kounev in World Wide Web (2015)

  2. No Access

    Chapter and Conference Paper

    Trust-Aware RBAC

    In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes trustworthiness of users into consideration explicitly before granting access. We assume that each role in the framework is assoc...

    Vladimir Oleshchuk in Computer Network Security (2012)

  3. No Access

    Chapter and Conference Paper

    Mobile Security with Location-Aware Role-Based Access Control

    This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatia...

    Nils Ulltveit-Moe, Vladimir Oleshchuk in Security and Privacy in Mobile Information… (2012)

  4. No Access

    Article

    Remote Patient Monitoring Within a Future 5G Infrastructure

    Systems of wearable or implantable medical devices (IMD), sensor systems for monitoring and transmitting physiological recorded signals, will in future health care services be used for purposes of remote monit...

    Vladimir Oleshchuk, Rune Fensli in Wireless Personal Communications (2011)

  5. No Access

    Article

    A survey on peer-to-peer SIP based communication systems

    Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information...

    **anghan Zheng, Vladimir Oleshchuk in Peer-to-Peer Networking and Applications (2010)

  6. Chapter and Conference Paper

    The Design of Secure and Efficient P2PSIP Communication Systems

    Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information...

    **anghan Zheng, Vladimir Oleshchuk in Information Security Theory and Practices.… (2010)

  7. Chapter and Conference Paper

    PRIvacy LEakage Methodology (PRILE) for IDS Rules

    This paper introduces a methodology for evaluating PRIvacy LEakage in signature-based Network Intrusion Detection System (IDS) rules. IDS rules that expose more data than a given percentage of all data session...

    Nils Ulltveit-Moe, Vladimir Oleshchuk in Privacy and Identity Management for Life (2010)

  8. No Access

    Chapter and Conference Paper

    A System Architecture for SIP/ IMS-based Multimedia Services

    The aim of IP Multimedia Subsystem (IMS) is not only to realize the convergence of the fixed or mobile networks at network level, but also to establish a uni-platform for providing services, no matter which ac...

    **anghan Zheng, Vladimir Oleshchuk in Novel Algorithms and Techniques In Telecom… (2008)

  9. No Access

    Chapter and Conference Paper

    Conformance Checking of RBAC Policy and its Implementation

    The purpose a security policy is to specify rules to govern access to system resources preferably without considering implementation details. Both policy and its implementation might be altered, and after intr...

    Frode Hansen, Vladimir Oleshchuk in Information Security Practice and Experience (2005)