Sciweavers

450 search results - page 28 / 90
» Research on Security Architecture and Protocols of Grid Comp...
Sort
View
GCC
2003
Springer
15 years 2 months ago
Component-Based Middleware Platform for Grid Computing
: In the Grid environment, user can manage and make use of web services, such as uploading or downloading web services. But when user want to download one web services to run it in...
Jianmin Zhu, Rong Chen, Guangnan Ni, Yuan Liu
SENSYS
2009
ACM
15 years 4 months ago
A wireless sensor network for border surveillance
We will demonstrate a wireless sensor network system for the surveillance of critical areas and properties – e.g. borders. The system consists of up to 10 sensor nodes that moni...
Denise Dudek, Christian Haas, Andreas Kuntz, Marti...
80
Voted
ICISS
2007
Springer
15 years 3 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 4 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
84
Voted
NDSS
2000
IEEE
15 years 2 months ago
An IPSec-based Host Architecture for Secure Internet Multicast
We propose a host architecture for secure IP multicast. We identify the basic components of the architecture, describe their functionalities and how they interact with one another...
Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Di...