Sciweavers

2517 search results - page 114 / 504
» Secure Deployment of Components
Sort
View
138
Voted
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
15 years 9 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru
107
Voted
AINA
2005
IEEE
15 years 9 months ago
Designing Secure Wireless Mobile Ad Hoc Networks
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured ...
Venkatesan Balakrishnan, Vijay Varadharajan
97
Voted
SAINT
2005
IEEE
15 years 9 months ago
Security Architecture for Control Networks using IPsec and KINK
There are many kinds of control networks which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automation...
Nobuo Okabe, Shoichi Sakane, Kazunori Miyazawa, Ke...
WORDS
2005
IEEE
15 years 9 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
131
Voted
EUROPKI
2007
Springer
15 years 7 months ago
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Jean Everson Martina, Túlio Cicero Salvaro ...