Sciweavers

2517 search results - page 122 / 504
» Secure Deployment of Components
Sort
View
144
Voted
CSREASAM
2009
15 years 4 months ago
A Service Framework based on Grades of IdPs and SPs
In Web services, a framework for the separation of authentication (IdP) and services (SP) has been proposed and actually deployed. In this framework, quality of information provide...
Sato Hiroyuki
104
Voted
IEEESP
2010
99views more  IEEESP 2010»
15 years 2 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
128
Voted
IEEEARES
2009
IEEE
15 years 1 months ago
Reducing the Cost of Session Key Establishment
Scenarios such as online banking, mobile payment systems, stock trading, selling merchandise, and a host of other applications that need a high level of security have moved from th...
Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi S...
126
Voted
TEAA
2005
Springer
126views Hardware» more  TEAA 2005»
15 years 9 months ago
Towards a Secure Data Stream Management System
Abstract. Todays data stream management systems (DSMSs) lack security functionality. Based on adversary scenarios we show how a DSMS architecture can be protected. We sketch a gene...
Wolfgang Lindner, Jörg Meier
CSREASAM
2003
15 years 5 months ago
Implementing a Prototype of the Security Framework for Distributed Brokering Systems
Security is an important element of any system design. Entities supported by a system need to securely interact with each other. The problem gets even more complex in the context ...
Yan Yan, Yi Huang, Geoffrey Fox, Shrideep Pallicka...