Sciweavers

6844 search results - page 1108 / 1369
» Web Service Security
Sort
View
ICPPW
2006
IEEE
15 years 10 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
IPCCC
2006
IEEE
15 years 10 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
SAINT
2006
IEEE
15 years 10 months ago
A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems
Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. So far most of t...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
ACSAC
2005
IEEE
15 years 10 months ago
Defensive Execution of Transactional Processes against Attacks
It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the...
Meng Yu, Wanyu Zang, Peng Liu
DATE
2005
IEEE
125views Hardware» more  DATE 2005»
15 years 10 months ago
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
The widening spectrum of applications and services provided by portable and embedded devices bring a new dimension of concerns in security. Most of those embedded systems (pay-TV,...
Reouven Elbaz, Lionel Torres, Gilles Sassatelli, P...
« Prev « First page 1108 / 1369 Last » Next »