Sciweavers

18094 search results - page 66 / 3619
» The Architecture of Secure Systems
Sort
View
SIGOPS
2008
120views more  SIGOPS 2008»
14 years 11 months ago
TVDc: managing security in the trusted virtual datacenter
Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and ap...
Stefan Berger, Ramón Cáceres, Dimitr...
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
15 years 3 months ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
ENTCS
2006
140views more  ENTCS 2006»
14 years 11 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...
CRITIS
2008
15 years 1 months ago
Testbeds for Assessing Critical Scenarios in Power Control Systems
Abstract. The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility Infrastructur...
Giovanna Dondossola, Geert Deconinck, Fabrizio Gar...
AINA
2006
IEEE
15 years 5 months ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick