Sciweavers

5722 search results - page 244 / 1145
» Security Function Interactions
Sort
View
AINA
2006
IEEE
15 years 6 months ago
Secure and Continuous Management of Heterogeneous Ad Hoc Networks
Addition of new nodes to a Sensor Network is a fundamental requirement for their continuity operation over time. We analyze the weakening of security due to node capture when addi...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri, Leon...
COMPSAC
2006
IEEE
15 years 6 months ago
A Service-Oriented Design Framework for Secure Network Applications
Abstract---Service Oriented Architecture (SOA) is an architectural style to reuse and integrate existing systems for designing new applications. Each application is designed in an ...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
DBSEC
2007
80views Database» more  DBSEC 2007»
15 years 4 months ago
A Scalable and Secure Cryptographic Service
In this paper we present the design of a scalable and secure cryptographic service that can be adopted to support large-scale networked systems, which may require strong authentica...
Shouhuai Xu, Ravi S. Sandhu
IWFM
2000
167views Formal Methods» more  IWFM 2000»
15 years 4 months ago
An Algebraic Basis for Specifying and Enforcing Access Control in Security Systems
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
Claus Pahl
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 3 months ago
A secure email login system using virtual password
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual...
Nishant Doshi