Sciweavers

1801 search results - page 290 / 361
» Implementation-Oriented Secure Architectures
Sort
View
137
Voted
IEEESP
2008
136views more  IEEESP 2008»
15 years 3 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
CN
2006
83views more  CN 2006»
15 years 3 months ago
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
This paper presents an assessment of the communication overheads of IPsec and evaluates the feasibility of deploying it on handheld devices for the UMTS architecture. A wide range...
Christos Xenakis, Nikolaos Laoutaris, Lazaros F. M...
ECRA
2007
69views more  ECRA 2007»
15 years 3 months ago
NetPay: An off-line, decentralized micro-payment system for thin-client applications
Micro-payment systems have become popular in recent times as the desire to support low-value, high-volume transactions of text, music, clip-art, video and other media has increase...
Xiaoling Dai, John C. Grundy
109
Voted
ENTCS
2007
121views more  ENTCS 2007»
15 years 3 months ago
Audit-Based Access Control for Electronic Health Records
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the secu...
M. A. C. Dekker, Sandro Etalle
111
Voted
SOSYM
2008
87views more  SOSYM 2008»
15 years 3 months ago
Model driven design and aspect weaving
Amodelisasimplifiedrepresentationofanaspect of the world for a specific purpose. In complex systems, many aspects are to be handled, from architectural aspects to dynamic behavior,...
Jean-Marc Jézéquel