Sciweavers

5386 search results - page 963 / 1078
» Approaches to Multimedia and Security
Sort
View
APNOMS
2009
Springer
15 years 4 months ago
IP Prefix Hijacking Detection Using Idle Scan
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacki...
Seong-Cheol Hong, Hong-Taek Ju, James W. Hong
BPM
2009
Springer
134views Business» more  BPM 2009»
15 years 4 months ago
Business Process-Based Resource Importance Determination
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Stefan Fenz, Andreas Ekelhart, Thomas Neubauer
TRUST
2009
Springer
15 years 4 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
68
Voted
CRYPTO
2009
Springer
109views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Randomizable Proofs and Delegatable Anonymous Credentials
We construct an efficient delegatable anonymous credentials system. Users can anonymously and unlinkably obtain credentials from any authority, delegate their credentials to other ...
Mira Belenkiy, Jan Camenisch, Melissa Chase, Marku...
IPOM
2009
Springer
15 years 4 months ago
A Feasibility Evaluation on Name-Based Routing
Abstract. The IPv4 addressing scheme has been the standard for Internet communication since it was established in the 1960s. However, the enormous increase in Internet traffic usag...
Haesung Hwang, Shingo Ata, Masayuki Murata