Sciweavers

4330 search results - page 83 / 866
» Analyzing security architectures
Sort
View
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
15 years 9 months ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández
144
Voted
TEC
2002
166views more  TEC 2002»
15 years 4 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
P2P
2003
IEEE
15 years 9 months ago
Secure and Resilient Peer-to-Peer E-Mail: Design and Implementation
E-mail is a mission-critical communication function for virtually all institutions. Modern e-mail employs a servercentric design, in which the user is critically dependent on her ...
Jussi Kangasharju, Keith W. Ross, David A. Turner
101
Voted
PERCOM
2005
ACM
16 years 4 months ago
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Vipul Gupta, Michael Wurm, Yu Zhu, Matthew Millard...
DRM
2006
Springer
15 years 8 months ago
Towards a secure and interoperable DRM architecture
In this paper we look at the problem of interoperability of digital rights management (DRM) systems in home networks. We introduce an intermediate module called the Domain Interop...
Gelareh Taban, Alvaro A. Cárdenas, Virgil D...