Sciweavers

241 search results - page 8 / 49
» Secure Remote Control of Field-programmable Network Devices
Sort
View
CCS
2009
ACM
15 years 10 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
IJCNN
2007
IEEE
15 years 3 months ago
DHP-Based Wide-Area Coordinating Control of a Power System with a Large Wind Farm and Multiple FACTS Devices
—Wide-area coordinating control is becoming an important issue and a challenging problem in the power industry. This paper proposes a novel optimal wide-area monitor and wide-are...
Wei Qiao, Ronald G. Harley, Ganesh K. Venayagamoor...
ICPPW
2003
IEEE
15 years 2 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
IADIS
2004
14 years 11 months ago
A distributed monitoring system with global network and Web technology
A distributed monitoring system has been developed, which is organized with network cameras, an integrated web/mail server, web-based clients including high-performance cellular p...
Yoshiro Imai, Daisuke Yamane, Osamu Sadayuki
SIGOPSE
2004
ACM
15 years 2 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn