Sciweavers

2281 search results - page 115 / 457
» Security Patterns and Secure Systems Design
Sort
View
88
Voted
CORR
2002
Springer
93views Education» more  CORR 2002»
15 years 10 days ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
ACISP
2006
Springer
15 years 6 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
88
Voted
MOBIHOC
2003
ACM
16 years 3 days ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
161
Voted
EUROISI
2008
15 years 2 months ago
Homeland Security Data Mining Using Social Network Analysis
The tragic events of September 11th have caused drastic effects on many aspects of society. Academics in the fields of computational and information science have been called upon ...
Hsinchun Chen
113
Voted
COMCOM
2000
95views more  COMCOM 2000»
15 years 10 days ago
Countermeasures for mobile agent security
: Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in...
Wayne A. Jansen