Sciweavers

1788 search results - page 71 / 358
» Integrating Security into the Curriculum
Sort
View
ACSAC
2009
IEEE
15 years 3 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...
ECOWS
2008
Springer
15 years 1 months ago
Validating Orchestration of Web Services with BPEL and Aggregate Signatures
In this paper, we present a framework providing integrity and authentication for secure workflow computation based on BPEL Web Service orchestration. We address a recent cryptogra...
Carlo Blundo, Emiliano De Cristofaro, Clemente Gal...
ATAL
2004
Springer
15 years 5 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
ESORICS
2009
Springer
16 years 15 days ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
INFOCOM
2012
IEEE
13 years 2 months ago
Locating malicious nodes for data aggregation in wireless networks
—Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable ...
XiaoHua Xu, Qian Wang, Jiannong Cao, Peng-Jun Wan,...