Sciweavers

1801 search results - page 143 / 361
» Implementation-Oriented Secure Architectures
Sort
View
ADHOCNOW
2006
Springer
14 years 3 months ago
Threats to Security in DSRC/WAVE
Dedicated Short Range Communications (DSRC) enabled road vehicles are on the brink of actualizing an important application of mobile ad hoc networks. It is crucial that the message...
Christine Laurendeau, Michel Barbeau
EPEW
2005
Springer
14 years 2 months ago
Choreographing Security and Performance Analysis for Web Services
We describe a UML-based method which supports model-driven development of service-oriented architectures including those used in Web services. Analysable content is extracted from ...
Stephen Gilmore, Valentin Haenel, Leïla Kloul...
HOTOS
2003
IEEE
14 years 2 months ago
Secure Data Replication over Untrusted Hosts
Data replication is a widely used technique for achieving fault tolerance and improved performance. With the advent of content delivery networks, it is becoming more and more freq...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
ICDCS
1998
IEEE
14 years 1 months ago
Experience with Secure Multi-Processing in Java
As Java is the preferred platform for the deployment of network computers, it is appealing to run multiple applications on a single Java desktop. We experimented with using the Ja...
Dirk Balfanz, Li Gong
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
14 years 1 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley