Sciweavers

3149 search results - page 210 / 630
» IT security risk management
Sort
View
LCN
1999
IEEE
14 years 1 months ago
An Architecture for Managing QoS-Enabled VPNs over the Internet
This paper describes an architecture for the management of QoS-enabled virtual private networks (VPNs) over the Internet. The architecture focuses on two important issues of VPNs:...
Manuel Günter, Torsten Braun, Ibrahim Khalil
SAFECOMP
2000
Springer
14 years 1 months ago
The Safety Management of Data-Driven Safety-Related Systems
Many safety-related systems are built from generic software which is customised to work in a particular situation by static configuration data. Examples of such systems are railwa...
A. G. Faulkner, P. A. Bennett, R. H. Pierce, I. H....
SEC
1996
13 years 11 months ago
Location management strategies increasing privacy in mobile communication
Mobile communication offers many new opportunities. However, because of the mobility of the subscribers trustworthiness of data, reliability and security are major issues. Our obj...
Dogan Kesdogan, Hannes Federrath, Anja Jerichow, A...
IEEEARES
2006
IEEE
14 years 3 months ago
Testing Complex Business Process Solutions
—Today’s business climate requires you to constantly evolve IT strategies responding to new opportunities or threats. While the fundamentals of IT - reliability, availability, ...
Gerd Saurer, Alexander Schatten
ASIACRYPT
2006
Springer
14 years 1 months ago
Analysis of One Popular Group Signature Scheme
The group signature scheme [1], ACJT for short, is popular. In this paper we show that it is not secure. It does not satisfy exculpability. The group manager can sign on behalf of ...
Zhengjun Cao