Sciweavers

1801 search results - page 22 / 361
» Memory-Centric Security Architecture
Sort
View
ACISP
1998
Springer
15 years 6 months ago
A Solution to Open Standard of PKI
PKI Public Key Infrastructure is fundamental for many security applications on the network. However, there are so many di erent kinds of PKI at current stage and they are not comp...
Qi He, Katia P. Sycara, Zhongmin Su
SIGCOMM
2010
ACM
15 years 2 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
CSFW
1999
IEEE
15 years 6 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
ACSW
2006
15 years 3 months ago
SKMA: a key management architecture for SCADA systems
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently...
Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel ...
112
Voted
AGENTS
1998
Springer
15 years 6 months ago
Integrating Active Perception with an Autonomous Robot Architecture
Today's robotics applications require complex, real-time, high-bandwidth sensor systems. Although many such systems have been developed [12][14][17][10], integrating them int...
Glenn S. Wasson, David Kortenkamp, Eric Huber