Sciweavers

2207 search results - page 14 / 442
» Security at the Internet Layer
Sort
View
JUCS
2010
114views more  JUCS 2010»
14 years 4 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
100
Voted
BCS
2008
14 years 11 months ago
A Vision of the Next Generation Internet: A Policy Oriented Perspective
Network Architecture (PONA) and an abstract two part protocol stack with a virtualization layer in between. We also introduce the concept of generalized communication end-points
Subarthi Paul, Raj Jain, Jianli Pan, Mic Bowman
73
Voted
JUCS
2007
88views more  JUCS 2007»
14 years 9 months ago
Internet Payment System: A New Payment System for Internet Transactions
: Payment systems need to address a number of security issues in order to be an effective and secure means of transferring payments across the Internet. To be accessible to a wider...
Zoran Djuric, Ognjen Maric, Dragan Gasevic
ACSAC
2000
IEEE
15 years 1 months ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
ICIW
2007
IEEE
15 years 3 months ago
Towards a Framework for Dynamic Verification of Peer-to-Peer Systems
Ensuring dependability and security of Peer-toPeer (P2P) systems is an intricate task due to the autonomous and volatile nature of peers and the decentralization that characterize...
Theofrastos Koulouris, George Spanoudakis, Theocha...