Sciweavers

1801 search results - page 44 / 361
» Memory-Centric Security Architecture
Sort
View
IJNSEC
2006
88views more  IJNSEC 2006»
15 years 1 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang
COMCOM
2007
106views more  COMCOM 2007»
15 years 1 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis
ARC
2011
Springer
198views Hardware» more  ARC 2011»
14 years 5 months ago
NetStage/DPR: A Self-adaptable FPGA Platform for Application-Level Network Security
Increasing transmission speeds in high-performance networks pose significant challenges to protecting the systems and networking infrastructure. Reconfigurable devices have alrea...
Sascha Mühlbach, Andreas Koch
IACR
2011
128views more  IACR 2011»
14 years 1 months ago
Identity-Based Cryptography for Cloud Security
—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents ...
Hongwei Li, Yuanshun Dai, Bo Yang
CCS
2007
ACM
15 years 8 months ago
Analysis of three multilevel security architectures
Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectura...
Timothy E. Levin, Cynthia E. Irvine, Clark Weissma...