Sciweavers

SECURWARE
2007
IEEE
13 years 11 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
SECURWARE
2007
IEEE
13 years 11 months ago
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services
—In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements sinc...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
SECURWARE
2007
IEEE
13 years 11 months ago
Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles
Pierre Parrend, Samuel Galice, Stéphane Fr&...
SECURWARE
2007
IEEE
13 years 11 months ago
Distributed Identity Management Model for Digital Ecosystems
— Digital Ecosystems is the new paradigm for dynamic IT business integration. A Digital Ecosystem consists of institutions that compete, collaborate, and form stable or unstable ...
Hristo Koshutanski, Mihaela Ion, Luigi Telesca
SECURWARE
2007
IEEE
13 years 11 months ago
Temporal Verification in Secure Group Communication System Design
The paper discusses an experience in using a realtime UML/SysML profile and a formal verification toolkit to check a secure group communication system against temporal requirement...
Benjamin Fontan, Sara Mota, Pierre de Saqui-Sannes...