Sciweavers

2358 search results - page 249 / 472
» A Secure Pervasive Environment
Sort
View
108
Voted
ICSE
2007
IEEE-ACM
16 years 4 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...
INFOCOM
2009
IEEE
15 years 10 months ago
Secure Range Queries in Tiered Sensor Networks
—We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data f...
Jing Shi, Rui Zhang, Yanchao Zhang
ICPADS
2006
IEEE
15 years 10 months ago
Secure and High-Performance Web Server System for Shared Hosting Service
We developed Hi-sap, a web server system that ensures the security in a server and has high performance when processing dynamic content. In existing servers, server embedded progr...
Daisuke Hara, Yasuichi Nakayama
INFOCOM
2006
IEEE
15 years 10 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
ISORC
2005
IEEE
15 years 9 months ago
Adaptable Situation-Aware Secure Service-Based (AS3) Systems
Service-based systems have many applications, including collaborative research and development, e-business, health care, environmental control, military applications, and homeland...
Stephen S. Yau, Hasan Davulcu, Supratik Mukhopadhy...