Sciweavers

66 search results - page 3 / 14
» Need to Know: Security or Liability
Sort
View
CRITIS
2006
13 years 10 months ago
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures....
Cristina Alcaraz, Rodrigo Roman
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 1 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 3 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
HICSS
2008
IEEE
138views Biometrics» more  HICSS 2008»
14 years 24 days ago
Cyber Security and Government Fusion Centers
The Department of Homeland Security has recommended the creation of State, Regional, and Community Fusion Centers. These centers, run by state and local governments, are designed ...
Natalie Granado, Gregory White
ICDCIT
2004
Springer
13 years 11 months ago
Distributing Key Updates in Secure Dynamic Groups
We focus on the problem of distributing key updates in secure dynamic groups. Due to changes in group membership, the group controller needs to change and distribute the keys used...
Sandeep S. Kulkarni, Bezawada Bruhadeshwar