Sciweavers

2560 search results - page 181 / 512
» Securing VO Management
Sort
View
AINA
2006
IEEE
15 years 11 months ago
A Bulk-retrieval Technique for Effective Remote Monitoring in a Mobile Environment
For effective management it is necessary to have methods by which management applications can periodically retrieve large volumes of information from network devices. In this work...
Glenn Mansfield Keeni, Kazuhide Koide, Takeo Saito...
144
Voted
SECURWARE
2008
IEEE
15 years 11 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
HICSS
2007
IEEE
150views Biometrics» more  HICSS 2007»
15 years 11 months ago
Security Ontologies: Improving Quantitative Risk Analysis
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...
128
Voted
ICOIN
2007
Springer
15 years 11 months ago
A Secure Message Percolation Scheme for Wireless Sensor Network
Wireless Sensor Network (WSN) deployed in hostile environments suffers from severe security threats. In this paper, we propose a Secure Message Percolation (SMP) scheme for WSN. We...
Md. Abdul Hamid, Choong Seon Hong
112
Voted
IEEEARES
2006
IEEE
15 years 11 months ago
Secure and Reliable Java-Based Middleware - Challenges and Solutions
Java and the Java Virtual Machine (JVM) are a predominant programming language and deployment platform for complex, component-oriented systems. In current standard Java runtime sy...
Walter Binder