Sciweavers

1949 search results - page 194 / 390
» Protective Interface Specifications
Sort
View
CAISE
2008
Springer
15 years 5 months ago
An Electronic Market-place Centralising Exchanges in the Virtual Enterprise: a Model Proposition
In this paper, we show that Service Oriented Architectures enable exchanges to be more flexible inside the virtual enterprise (VE), because they create an electronic market-place b...
Hervé Mathieu
CCS
2008
ACM
15 years 5 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
APSCC
2006
IEEE
15 years 5 months ago
GHIDS: Defending Computational Grids against Misusing of Shared Resources
Detecting intrusions at host level is vital to protecting shared resources in grid, but traditional Host-based Intrusion Detecting System (HIDS) is not suitable for grid environme...
Guofu Feng, Xiaoshe Dong, Weizhe Liu, Ying Chu, Ju...
FC
2008
Springer
82views Cryptology» more  FC 2008»
15 years 4 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
CRITIS
2007
15 years 4 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen