Sciweavers

6195 search results - page 193 / 1239
» Cloud Computing Security
Sort
View
COMPUTER
2007
102views more  COMPUTER 2007»
15 years 4 months ago
Challenges in Securing Networked J2ME Applications
André N. Klingsheim, Vebjørn Moen, K...
COMPUTER
2007
52views more  COMPUTER 2007»
15 years 4 months ago
Reengineering the Internet for Better Security
Manoj Parameswaran, Xia Zhao, Andrew B. Whinston, ...
102
Voted
COMPUTER
2007
72views more  COMPUTER 2007»
15 years 4 months ago
Enterprise Security for Web 2.0
Mary Ann Davidson, Elad Yoran
ISF
2008
114views more  ISF 2008»
15 years 4 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
INFOCOM
2008
IEEE
15 years 11 months ago
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Xukai Zou, Yuan-Shun Dai, Elisa Bertino