Sciweavers

1186 search results - page 63 / 238
» A New Approach to Secure Logging
Sort
View
SASN
2005
ACM
15 years 6 months ago
Coordinated sensor deployment for improving secure communications and sensing coverage
Sensor network has a great potential in applications such as habitat monitoring, wildlife tracking, building surveillance, and military combat. The design of a sensor network syst...
Yinian Mao, Min Wu
AINA
2007
IEEE
15 years 7 months ago
Towards Quantifying the (In)Security of Networked Systems
Traditional security analyses are often geared towards cryptographic primitives or protocols. Although such analyses are absolutely necessary, they do not provide much insight for...
Xiaohu Li, T. Paul Parker, Shouhuai Xu
COOPIS
2004
IEEE
15 years 4 months ago
Security Management Through Overloading Views
The model of overloading views is a facility allowing the programmer to separate some kinds of crosscutting concerns that occur during design, implementation and maintenance of dat...
Radoslaw Adamus, Kazimierz Subieta
DASC
2006
IEEE
15 years 4 months ago
Runtime Security Verification for Itinerary-Driven Mobile Agents
We present a new approach to ensure the secure execution of itinerary-driven mobile agents, in which the specification of the navigational behavior of an agent is separated from t...
Zijiang Yang, Shiyong Lu, Ping Yang
JSW
2007
97views more  JSW 2007»
15 years 13 days ago
Using Aspect Programming to Secure Web Applications
—As the Internet users increase, the need to protect  web servers from malicious users has become a priority in  many   organizations   and   companies.   ...
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturi...