Sciweavers

1801 search results - page 12 / 361
» Implementation-Oriented Secure Architectures
Sort
View
85
Voted
CCS
2006
ACM
15 years 5 months ago
Is risk a good security metric?
Why measuring security? To make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during d...
O. Sami Saydjari
129
Voted
SACMAT
2010
ACM
15 years 8 days ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
94
Voted
IJNSEC
2008
110views more  IJNSEC 2008»
15 years 1 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis
ACSAC
1999
IEEE
15 years 6 months ago
Security Architecture Development and Results for a Distributed Modeling and Simulation System
This paper reports on an ongoing effort to define the security architecture for the Joint Simulation System (JSIMS), a joint military modeling and simulation system. It also descr...
Richard B. Neely
73
Voted
OOPSLA
2005
Springer
15 years 7 months ago
Security patterns and evolution of MTA architecture
Munawar Hafiz