Sciweavers

2281 search results - page 84 / 457
» Security Patterns and Secure Systems Design
Sort
View
SISW
2005
IEEE
15 years 6 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
87
Voted
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
15 years 5 months ago
Secure Transmission of the Prescription Order Communication System Based on the Internet and the Public-Key Infrastructure Using
This research paper presents a new system's design and development of the prescription order communication system (POCS) based on the Internet between the hospital and the ph...
Won Jay Song, Byung-Ha Ahn
82
Voted
CCGRID
2005
IEEE
15 years 6 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
135
Voted
I3E
2001
196views Business» more  I3E 2001»
15 years 1 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
ESCIENCE
2006
IEEE
15 years 6 months ago
Communication over a Secured Heterogeneous Grid with the GriddLeS Runtime Environment
Scientific workflows are a powerful programming technique for specifying complex computations using a number of otherwise independent components. When used in a Grid environment, ...
Jagan Kommineni, David Abramson, Jefferson Tan