Sciweavers

2517 search results - page 168 / 504
» Secure Deployment of Components
Sort
View
ACSAC
2003
IEEE
15 years 9 months ago
A Multi-View Tool for Checking the Security Semantics of Router Configurations
Routers are critical components of IP networks, but hardly any tool support for analyzing their security exists to date. We have developed such a tool, named CROCODILE, that track...
Holger Peine, Reinhard Schwarz
JSW
2007
141views more  JSW 2007»
15 years 3 months ago
Building Dependable and Secure Web Services
— Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services can ...
Louise E. Moser, P. Michael Melliar-Smith, Wenbing...
129
Voted
ICC
2008
IEEE
141views Communications» more  ICC 2008»
15 years 10 months ago
Secure Group-Based Information Sharing in Mobile Ad Hoc Networks
Abstract—Secure multicast has become an important component of many applications in wireless networks. In this paper, we investigate secure intra and inter group information shar...
Weichao Wang, Yu Wang 0003
115
Voted
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
15 years 10 months ago
Implementation-Oriented Secure Architectures
We propose a framework for constructing secure systems at the architectural level. This framework is composed of an implementation-oriented formalization of a system’s architect...
Daniel Conte de Leon, Jim Alves-Foss, Paul W. Oman
134
Voted
NCA
2006
IEEE
15 years 10 months ago
A Multipolicy Authorization Framework for Grid Security
A Grid system is a Virtual Organization that is composed of several autonomous domains. Authorization in such a system needs to be flexible and scalable to support multiple securi...
Bo Lang, Ian T. Foster, Frank Siebenlist, Rachana ...