Sciweavers

3638 search results - page 149 / 728
» Distribution chain security
Sort
View
COLCOM
2007
IEEE
15 years 10 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
15 years 8 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
KES
2008
Springer
15 years 3 months ago
A Secure Mediator for Integrating Multiple Level Access Control Policies
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
Isabel F. Cruz, Rigel Gjomemo, Mirko Orsini
SEC
2003
15 years 5 months ago
Security, Fault-Tolerance and their Verification for Ambient Systems
For the emerging ambient environments, in which interconnected intelligent devices will surround us to increase the comfort of our lives, fault tolerance and security are of paramo...
Jaap-Henk Hoepman
124
Voted
ESCIENCE
2006
IEEE
15 years 10 months ago
Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid
The ability to dynamically create and subsequently manage secure virtual organisations (VO) is one of the key challenges facing the Grid community. Existing approaches for establi...
Richard O. Sinnott, David W. Chadwick, Jos Koetsie...