Sciweavers

52 search results - page 4 / 11
» Towards automated provisioning of secure virtualized network...
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
IJNSEC
2008
152views more  IJNSEC 2008»
14 years 9 months ago
Group Key Management in MANETs
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
SMARTNET
2000
14 years 11 months ago
Internet Service Delivery Control with Mobile Code
The trend towards value-added Internet services causes network providers to deploy new network based quality-of-service and security services. Today, however, the customer has onl...
Manuel Günter, Torsten Braun
SIS
2004
14 years 11 months ago
Semantic Interoperability of Authorizations
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this s...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
IJAMC
2008
84views more  IJAMC 2008»
14 years 9 months ago
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments
Abstract-- In this paper we propose a distributed authentication service for peer-to-peer (P2P) based massively multiuser virtual environments. Such a service is necessary to provi...
Arno Wacker, Gregor Schiele, Sebastian Schuster, T...