Sciweavers

2904 search results - page 183 / 581
» Internet Infrastructure Security
Sort
View
123
Voted
ICIW
2009
IEEE
15 years 10 months ago
BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business
When considering Web services’ (WS) use for online business-to-business (B2B) collaboration between companies, security is a complicated and very topical issue. This is especial...
Jason R. C. Nurse, Jane Sinclair
SAINT
2008
IEEE
15 years 10 months ago
ROOK: Multi-session Based Network Security Event Detector
We have implemented Multi-Session based Network Security Event Detector: ROOK to detect botnet activity and P2P file sharing traffic and our results show that our method is less...
Masayoshi Mizutani, Shin Shirahata, Masaki Minami,...
152
Voted
ICNP
2002
IEEE
15 years 8 months ago
A Secure Routing Protocol for Ad Hoc Networks
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protoc...
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine...
NSDI
2010
15 years 5 months ago
Airavat: Security and Privacy for MapReduce
We present Airavat, a MapReduce-based system which provides strong security and privacy guarantees for distributed computations on sensitive data. Airavat is a novel integration o...
Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vit...
114
Voted
MKWI
2008
137views Business» more  MKWI 2008»
15 years 5 months ago
Improving information security compliance - A process-oriented approach for managing organizational change
Abstract: Enterprises typically have to comply with many different legal, regulatory and internal requirements. Particularly in the context of information processing, there are ded...
Roland Gabriel, Sebastian Sowa, Jochen Wiedemann