Sciweavers

991 search results - page 14 / 199
» Foundations for Designing Secure Architectures
Sort
View
ACSAC
2000
IEEE
15 years 2 months ago
Security Architecture for Federated Cooperative Information Systems
The paper describes the design and implementation of a security architecture for a Cooperative Information System implemented with CORBA technologies. We first define a role-based...
Pierre Bieber, D. Raujol, Pierre Siron
JNW
2008
126views more  JNW 2008»
14 years 9 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
VLSID
2004
IEEE
168views VLSI» more  VLSID 2004»
15 years 10 months ago
VLSI Implementation of Visible Watermarking for a Secure Digital Still Camera Design
Watermarking is the process that embeds data called a watermark into a multimedia object for its copyright protection. The digital watermarks can be visible to a viewer on careful...
Saraju P. Mohanty, Nagarajan Ranganathan, Ravi Nam...
LCN
1999
IEEE
15 years 2 months ago
An Architecture for Managing QoS-Enabled VPNs over the Internet
This paper describes an architecture for the management of QoS-enabled virtual private networks (VPNs) over the Internet. The architecture focuses on two important issues of VPNs:...
Manuel Günter, Torsten Braun, Ibrahim Khalil
CCS
2009
ACM
15 years 4 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...