Sciweavers

1353 search results - page 60 / 271
» Securing Current and Future Process Control Systems
Sort
View
CCGRID
2005
IEEE
15 years 8 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
ICNP
2003
IEEE
15 years 8 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
ICWE
2004
Springer
15 years 8 months ago
Reliable and Adaptable Security Engineering for Database-Web Services
The situation in engineering security for Web services that access databases is as follows: On the one hand, specifications like WSSecurity are concerned with the security managem...
Martin Wimmer, Daniela Eberhardt, Pia Ehrnlechner,...
GI
2009
Springer
15 years 29 days ago
Frontloading: Virtual Quality Assurance for Improved Service Launch Processes
: Swift and frictionless launches of new products are a decisive capability of future telecommunication providers, especially in an all-IP production environment. These processes a...
Heiko Lehmann, Uwe Beyer, Simon Cohnitz, Udo Bub
SMC
2010
IEEE
228views Control Systems» more  SMC 2010»
15 years 1 months ago
A safe communication scheme for an intelligent Wireless Networked Control System Coordination Agent
Abstract— Wireless networked control systems have begun to gain acceptance during the last decade, largely due to the increased flexibility and lower costs they promise to provi...
James H. Taylor, Hazem M. S. Ibrahim, Jeff Slipp, ...