Sciweavers

772 search results - page 35 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
ISF
2008
114views more  ISF 2008»
13 years 7 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
CSE
2009
IEEE
13 years 11 months ago
Adapting Privacy-Preserving Computation to the Service Provider Model
There are many applications for Secure Multi-Party Computation (SMC), but practical adoption is still an issue. One reason is that the business model of the application does not m...
Florian Kerschbaum
SAC
2006
ACM
13 years 7 months ago
Towards reliable OSGi framework and applications
Upcoming ubiquitous computing systems are required to operate in dynamic, diverse, unverified, and unpredictable operating environment. The OSGi (Open Service Gateway initiative) ...
Heejune Ahn, Hyukjun Oh, Chang Oan Sung
IPPS
2008
IEEE
14 years 2 months ago
The design of a versatile, secure P2PSIP communications architecture for the public internet
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
David A. Bryan, Bruce Lowekamp, Marcia Zangrilli
TRUST
2009
Springer
14 years 2 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi