Sciweavers

176 search results - page 27 / 36
» Mobile-driven architecture for managing enterprise security ...
Sort
View
CCS
2010
ACM
14 years 8 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
99
Voted
MOBIQUITOUS
2008
IEEE
15 years 3 months ago
A secure middleware for wireless sensor networks
SMEPP Light is a middleware for Wireless Sensor Networks (WSNs) based on mote-class sensors. It is derived from the specification developed under the framework of the SMEPP proje...
Claudio Vairo, Michele Albano, Stefano Chessa
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
15 years 3 months ago
Safeguard Intranet Using Embedded and Distributed Firewall System
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-...
WETICE
2003
IEEE
15 years 2 months ago
WebDAVA: An Administrator-Free Approach To Web File-Sharing
Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows users to de...
Alexander Levine, Vassilis Prevelakis, John Ioanni...
82
Voted
ICPADS
2007
IEEE
15 years 3 months ago
Extending GridSim with an architecture for failure detection
Grid technologies are emerging as the next generation of distributed computing, allowing the aggregation of resources that are geographically distributed across different location...
Agustín C. Caminero, Anthony Sulistio, Blan...