Sciweavers

1801 search results - page 45 / 361
» Memory-Centric Security Architecture
Sort
View
NOMS
2000
IEEE
15 years 6 months ago
Threat analysis and security architecture of mobile agent based management systems
Security issues are very important for the acceptance of mobile agent technology in management. We present a threat analysis and security architecture for these problems.
Helmut Reiser, Gerald Vogt
ACMSE
2006
ACM
15 years 8 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
EUROPKI
2007
Springer
15 years 8 months ago
Authorization Architectures for Privacy-Respecting Surveillance
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...
Ulrich Flegel, Michael Meier
CORR
2011
Springer
189views Education» more  CORR 2011»
14 years 9 months ago
Secure Routing in Wireless Mesh Networks
— This paper introduces Policy based Management Information Base to mange danger in Artificial Immune System inspired secure routing in Wireless Mesh Networks. WMN management fun...
Jaydip Sen
CMS
2003
171views Communications» more  CMS 2003»
15 years 3 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent