Sciweavers

308 search results - page 24 / 62
» On implementing security at the transport layer
Sort
View
CCS
2006
ACM
15 years 2 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
OOPSLA
2007
Springer
15 years 5 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
15 years 4 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
ICCCN
2008
IEEE
15 years 5 months ago
Security Extensions for Space-Link Communication
—In recent times, the importance of information security in civilian space communication systems has increased significantly among space agencies. Those systems often require a ...
Daniel Fischer, Mario Merri, Thomas Engel
105
Voted
CSREASAM
2007
15 years 15 days ago
A PDA Implementation of an Off-line e-Cash Protocol
— We present an efficient implementation of a fair e-cash protocol especially designed for mobile wireless environments. Our protocol attempts to offer a reasonable balance betw...
Efrén Clemente-Cuervo, Francisco Rodr&iacut...