Sciweavers

68 search results - page 3 / 14
» Analysis of a Redundant Architecture for Critical Infrastruc...
Sort
View
SECPERU
2006
IEEE
14 years 11 days ago
Service-Oriented Security Architecture for CII based on Sensor Networks
The extraordinary growth of the Information Society is originating a high dependency on ICT. This provokes that those strongly interrelated technological infrastructures, as well ...
Javier Lopez, José A. Montenegro, Rodrigo R...
HICSS
2008
IEEE
146views Biometrics» more  HICSS 2008»
14 years 24 days ago
Toward a Generic Model of Security in an Organizational Context: Exploring Insider Threats to Information Infrastructure
This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical in...
Ignacio J. Martinez-Moyano, Michael E. Samsa, Jame...
JNW
2006
142views more  JNW 2006»
13 years 6 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
GLOBECOM
2007
IEEE
14 years 20 days ago
Redundant Array of Independent Fabrics - An Architecture for Next Generation Network
As the next generation network begins to incorporate the Internet, telecommunication and TV services, it becomes one of the most critical infrastructures for our society. Routers c...
Rongsen He, José G. Delgado-Frias
GLVLSI
2010
IEEE
154views VLSI» more  GLVLSI 2010»
13 years 8 months ago
Resource-constrained timing-driven link insertion for critical delay reduction
For timing-driven or yield-driven designs, non-tree routing has become more and more popular and additional loops provide the redundant paths to protect against the effect of the ...
Jin-Tai Yan, Zhi-Wei Chen