Sciweavers

3638 search results - page 121 / 728
» Distribution chain security
Sort
View
87
Voted
CLOUDCOM
2010
Springer
15 years 18 days ago
Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning
Yuri Demchenko, Cees de Laat, Diego R. Lopez, Joan...
136
Voted
DIMVA
2006
15 years 4 months ago
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe
This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks and suspect tools as part of a computer crime recons...
André Årnes, Paul Haas, Giovanni Vign...
124
Voted
INFOCOM
2010
IEEE
15 years 15 days ago
SafeQ: Secure and Efficient Query Processing in Sensor Networks
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widel...
Fei Chen, Alex X. Liu
114
Voted
IPPS
2005
IEEE
15 years 8 months ago
Speculative Security Checks in Sandboxing Systems
Sandboxing systems are extremely useful for secure execution of untrusted applications. Many of the sandboxing systems proposed so far provide security by intercepting system call...
Yoshihiro Oyama, Koichi Onoue, Akinori Yonezawa
116
Voted
FTDCS
1999
IEEE
15 years 7 months ago
Supporting Real World Security Models in Java
The Java Security Model has undergone considerable evolution since its initial implementation. However, due to its historical focus on securing machines against attack from hostil...
Ian Welch, Robert J. Stroud