Sciweavers

5722 search results - page 190 / 1145
» Security Function Interactions
Sort
View
98
Voted
CSREASAM
2006
15 years 2 months ago
Adaptive Security Metrics for Computer Systems
The major concern for a computer system is its security and integrity. It is necessary to check the security level of your system and keep it updated. This can be best achieved by ...
Satish Baddelpeli, Gregory Vert
139
Voted
ENTCS
2007
131views more  ENTCS 2007»
15 years 22 days ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
96
Voted
ICC
2009
IEEE
14 years 10 months ago
Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks
Abstract--In this work, we address the performance problems that arise when unicast security protocols IPSEC and SSL are applied for securing the end-to-end communication in hybrid...
Ayan Roy Chowdhury, John S. Baras
78
Voted
WWW
2007
ACM
16 years 1 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang
87
Voted
IEEEARES
2007
IEEE
15 years 7 months ago
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
Ludwig Fuchs, Günther Pernul