Sciweavers

2517 search results - page 108 / 504
» Secure Deployment of Components
Sort
View
ISN
1998
Springer
109views Communications» more  ISN 1998»
15 years 7 months ago
Offering Role Mobility in a TINA Environment
This paper presents the concept of role mobility and the value of role mobility in an open service environment. We outline the aspects of role management and role mobility and we d...
Thanassis Tiropanis
119
Voted
CCS
2007
ACM
15 years 9 months ago
An algorithm for the appraisal of assurance indicators for complex business processes
In order to provide certified security services we must provide indicators that can measure the level of assurance that a complex business process can offer. Unfortunately the fo...
Fabio Massacci, Artsiom Yautsiukhin
IEEEARES
2009
IEEE
15 years 10 months ago
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests
—The security assessment of the ICT components of critical infrastructures is nowadays a prominent problem. Risk assessment methodologies require, in order to be effective, to be...
Marcelo Masera, Igor Nai Fovino
CCS
1998
ACM
15 years 7 months ago
A Security Architecture for Computational Grids
State-of-the-art and emerging scientific applications require fast access to large quantities of data and commensurately fast computational resources. Both resources and data are ...
Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven...
115
Voted
CONEXT
2006
ACM
15 years 9 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig