Sciweavers

1801 search results - page 45 / 361
» Implementation-Oriented Secure Architectures
Sort
View
ACSAC
2000
IEEE
14 years 11 days ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
HICSS
2009
IEEE
128views Biometrics» more  HICSS 2009»
13 years 11 months ago
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models
To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This...
Teodor Sommestad, Mathias Ekstedt, Pontus Johnson
ITIIS
2008
128views more  ITIIS 2008»
13 years 8 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
SAFECOMP
2005
Springer
14 years 1 months ago
Problem Frames and Architectures for Security Problems
Abstract. We present several problem frames that serve to structure, characterize and analyze software development problems in the area of software and system security. These probl...
Denis Hatebur, Maritta Heisel
ICAI
2003
13 years 9 months ago
A Secure Agent Architecture for Sensor Networks
Advances in sensor and wireless technologies will enable thousands, or even millions of small but smart sensors to be deployed for a wide range of monitoring applications. The sen...
Zhaoyu Liu, Yongge Wang