Sciweavers

4330 search results - page 130 / 866
» Analyzing security architectures
Sort
View
138
Voted
AINA
2003
IEEE
15 years 10 months ago
Design, Implementation and Performance Evaluation of IP-VPN
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a netwo...
Jin-Cherng Lin, Ching-Tien Chang, Wei-Tao Chung
OTM
2007
Springer
15 years 11 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
COMPSAC
2000
IEEE
15 years 9 months ago
Firewall Security: Policies, Testing and Performance Evaluation
This paper explores the firewall security and performance relationship for distributed systems. Experiments are conducted to set firewall security into seven different levels and ...
Michael R. Lyu, Lorrien K. Y. Lau
IJISEC
2007
149views more  IJISEC 2007»
15 years 5 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
153
Voted
FIW
2009
120views Communications» more  FIW 2009»
15 years 2 months ago
Software Security Vulnerabilities Seen As Feature Interactions
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level...
Guy-Vincent Jourdan