Sciweavers

991 search results - page 38 / 199
» Foundations for Designing Secure Architectures
Sort
View
JSAC
2006
139views more  JSAC 2006»
14 years 10 months ago
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable and effective solution to ubiquitous broadband Internet access. This paper addresses the secu...
Yanchao Zhang, Yuguang Fang
APSCC
2008
IEEE
14 years 12 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré
TEC
2002
166views more  TEC 2002»
14 years 9 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
HICSS
2007
IEEE
144views Biometrics» more  HICSS 2007»
15 years 4 months ago
Towards a Methodology for Service Construction
— All large vendors of standard business software have announced to move to service oriented architecture. They claim benefits for their customers with regard to agility and ope...
Joachim Schelp, Robert Winter
DRM
2006
Springer
15 years 1 months ago
Towards a secure and interoperable DRM architecture
In this paper we look at the problem of interoperability of digital rights management (DRM) systems in home networks. We introduce an intermediate module called the Domain Interop...
Gelareh Taban, Alvaro A. Cárdenas, Virgil D...