Sciweavers

2504 search results - page 5 / 501
» Enterprise Security Architecture
Sort
View
SIGCOMM
2009
ACM
15 years 4 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
ISF
2008
114views more  ISF 2008»
14 years 9 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
89
Voted
WMASH
2004
ACM
15 years 2 months ago
Secure universal mobility for wireless internet
The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802.11, WCDMA, cdma2000, and ...
Ashutosh Dutta, Tao Zhang, Sunil Madhani, Kenichi ...
77
Voted
JSW
2007
141views more  JSW 2007»
14 years 9 months ago
Building Dependable and Secure Web Services
— Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services can ...
Louise E. Moser, P. Michael Melliar-Smith, Wenbing...
ISTA
2004
14 years 10 months ago
Enterprise Architecture Modeling using Agent Paradigm
: New approaches to modeling and design of enterprise systems must enable enterprises to offer dramatically improved capabilities including more effective enterprise architectures,...
Olfa Lamouchi, Amar Ramdane-Cherif, Nicole L&eacut...