Sciweavers

1801 search results - page 110 / 361
» Implementation-Oriented Secure Architectures
Sort
View
ICWS
2004
IEEE
13 years 9 months ago
Best-Practice Patterns and Tool Support for Configuring Secure Web Services Messaging
This paper presents an emerging tool for security configuration of service-oriented architectures with Web Services. Security is a major concern when implementing mission-critical...
Michiaki Tatsubori, Takeshi Imamura, Yuhichi Nakam...
CN
2010
90views more  CN 2010»
13 years 8 months ago
The price of security in wireless sensor networks
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...
Jongdeog Lee, Krasimira Kapitanova, Sang Hyuk Son
COMCOM
2002
189views more  COMCOM 2002»
13 years 8 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
COMSUR
2008
110views more  COMSUR 2008»
13 years 7 months ago
Service discovery for mobile ad hoc networks: A survey of issues and techniques
This paper surveys research in service advertising, discovery and selection for mobile ad hoc networks (MANETs) and related issues. We include a categorization of service discovery...
Christopher N. Ververidis, George C. Polyzos
CAP
2010
13 years 3 months ago
Parallel arithmetic encryption for high-bandwidth communications on multicore/GPGPU platforms
In this work we study the feasibility of high-bandwidth, secure communications on generic machines equipped with the latest CPUs and General-Purpose Graphical Processing Units (GP...
Ludovic Jacquin, Vincent Roca, Jean-Louis Roch, Mo...