Sciweavers

438 search results - page 37 / 88
» Defending Critical Infrastructure
Sort
View
MIDDLEWARE
2004
Springer
14 years 2 months ago
Toward a standard ubiquitous computing framework
This paper surveys a variety of subsystems designed to be the building blocks from which sophisticated infrastructures for ubiquitous computing are assembled. Our experience shows...
Martin Modahl, Bikash Agarwalla, Gregory D. Abowd,...
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
14 years 3 months ago
Geographically Distributed Enterprise Architecting: Towards a Theoretical Framework
Enterprise architecting is becoming critical for most modern organizations whose competitive strategies are tightly linked to the underlying information technology (IT) infrastruc...
J. Alberto Espinosa, Frank Armour
EUROPKI
2007
Springer
14 years 3 months ago
AutoPKI: A PKI Resources Discovery System
The central goal of Public Key Infrastructure (PKI) is to enable trust judgments between distributed users. Although certificates play a central role in making such judgments, a P...
Massimiliano Pala, Sean W. Smith
ACSAC
2006
IEEE
14 years 2 months ago
Vulnerability Analysis of MMS User Agents
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users thr...
Collin Mulliner, Giovanni Vigna
HICSS
2006
IEEE
80views Biometrics» more  HICSS 2006»
14 years 2 months ago
A Stakeholder Perspective on Successful Electronic Payment Systems Diffusion
Many proposals for electronic payment systems (EPS) have been made but the great majority have failed to achieve widespread adoption. The reasons why some proposals succeed and ot...
Sangjo Oh