Sciweavers

4264 search results - page 56 / 853
» Provenance-aware secure networks
Sort
View
ECIS
2000
14 years 11 months ago
Towards a Secure Web-Based Health Care Application
Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
Susanne Röhrig, Konstantin Knorr
ADHOCNOW
2004
Springer
15 years 3 months ago
Energy-Memory-Security Tradeoffs in Distributed Sensor Networks
David Hwang, Bo-Cheng Lai, Ingrid Verbauwhede
IWAN
2004
Springer
15 years 3 months ago
Secure Service Signaling and Fast Authorization in Programmable Networks
Michael Conrad, Thomas Fuhrmann, Marcus Schöl...
TELSYS
2010
140views more  TELSYS 2010»
14 years 4 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
IMC
2010
ACM
14 years 7 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...