Sciweavers

6195 search results - page 222 / 1239
» Cloud Computing Security
Sort
View
PERCOM
2010
ACM
15 years 3 months ago
When Eco-IT meets security: Concealed network coding for multicast traffic
Alban Hessler, Takahiro Kakumaru, Dirk Westhoff
COMCOM
2011
14 years 12 months ago
Securing the data path of next-generation router systems
Tilman Wolf, Russell Tessier, Gayatri Prabhu
139
Voted
IDTRUST
2010
ACM
15 years 11 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
IEEEARES
2006
IEEE
15 years 11 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 10 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel