Sciweavers

434 search results - page 16 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
ECR
2010
129views more  ECR 2010»
13 years 8 months ago
The design of a reliable reputation system
Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse user populations spread across numerous administrative and security domains. Zero...
Gayatri Swamynathan, Kevin C. Almeroth, Ben Y. Zha...
IFIP
2007
Springer
14 years 2 months ago
Lessons Learned from the Maroochy Water Breach
Supervisory control and data acquisition (SCADA) systems are widely used to monitor and control operations in electrical power distribution facilities, oil and gas pipelines, water...
Jill Slay, Michael Miller
WORDS
2005
IEEE
14 years 2 months ago
Enhancing DNS Security using the SSL Trust Infrastructure
The main functionality of the Domain Name System (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, ...
Christof Fetzer, Gert Pfeifer, Trevor Jim
TCOS
2010
13 years 3 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin
IEEEARES
2006
IEEE
14 years 2 months ago
Securing DNS Services through System Self Cleansing and Hardware Enhancements
-- Domain Name Systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are e...
Yih Huang, David Arsenault, Arun Sood