Sciweavers

4263 search results - page 107 / 853
» Network Security
Sort
View
IPOM
2009
Springer
15 years 10 months ago
Security Considerations for Intrinsic Monitoring within IPv6 Networks
Abstract. Intrinsic Monitoring is a method of collecting and disseminating node specific monitoring data throughout an IPv6 network by using the IPv6 extension headers as a carrie...
Lei Shi, Alan Davy
BROADNETS
2006
IEEE
15 years 9 months ago
A Secure Programming Paradigm for Network Virtualization
—The central paradigm of today’s successful Internet is to keep the network core simple and move complexity towards the network end points. Unfortunately, this very paradigm li...
Ana Milanova, Sonia Fahmy, David Musser, Büle...
FC
2010
Springer
157views Cryptology» more  FC 2010»
15 years 4 months ago
A Framework for Understanding and Applying Ethical Principles in Network and Security Research
Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, we present an intellectual framework for understanding and a...
Erin Kenneally, Michael Bailey, Douglas Maughan
121
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Generating Policies for Defense in Depth
Coordinating multiple overlapping defense mechat differing levels of abstraction, is fraught with the potential for misconfiguration, so there is strong motivation to generate p...
Paul Rubel, Michael Ihde, Steven Harp, Charles Pay...
WISA
2009
Springer
15 years 10 months ago
Securing Remote Access Inside Wireless Mesh Networks
Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse c...
Mark Manulis