Sciweavers

2504 search results - page 98 / 501
» Enterprise Security Architecture
Sort
View
SAINT
2005
IEEE
15 years 5 months ago
Security Architecture for Control Networks using IPsec and KINK
There are many kinds of control networks which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automation...
Nobuo Okabe, Shoichi Sakane, Kazunori Miyazawa, Ke...
WIKIS
2010
ACM
15 years 3 days ago
ThinkFree: using a visual Wiki for IT knowledge management in a tertiary institution
We describe ThinkFree, an industrial Visual Wiki application which provides a way for end users to better explore knowledge of IT Enterprise Architecture assets that is held withi...
Christian Hirsch, John G. Hosking, John C. Grundy,...
ANCS
2007
ACM
15 years 3 months ago
Design of a network architecture with inherent data path security
Next-generation Internet architectures require designs with inherent security guarantees. We present a network architecture that uses credentials to audit traffic in the data path...
Tilman Wolf
CCGRID
2005
IEEE
15 years 5 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
HICSS
1998
IEEE
135views Biometrics» more  HICSS 1998»
15 years 4 months ago
The Architecture of Secure Systems
Secure system design, veri cation and validation is often a daunting task, involving the merger of various protection mechanisms in conjunction with system security policy and con...
Jim Alves-Foss