Sciweavers

1801 search results - page 25 / 361
» Memory-Centric Security Architecture
Sort
View
89
Voted
CSREASAM
2006
15 years 3 months ago
The Information Security Guideline for SMEs in Korea
To address current difficulties of SMEs that are reluctant to invest in information security due to cost, this paper intends to provide an information security guideline that will...
Gang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il L...
ENTCS
2007
112views more  ENTCS 2007»
15 years 1 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
110
Voted
SPW
2001
Springer
15 years 6 months ago
Towards a Survivable Security Architecture for Ad-Hoc Networks
Tuomas Aura, Silja Mäki
85
Voted
ACSAC
2000
IEEE
15 years 6 months ago
Security Architectures for Controlled Digital Information Dissemination
Jaehong Park, Ravi S. Sandhu, J. Schifalacqua