Sciweavers

1801 search results - page 66 / 361
» Implementation-Oriented Secure Architectures
Sort
View
JNSM
2007
65views more  JNSM 2007»
13 years 8 months ago
Implementation of a Formal Security Policy Refinement Process in WBEM Architecture
Romain Laborde, Michel Kamel, François Barr...
CIS
2006
Springer
13 years 11 months ago
Security Contexts in Autonomic Systems
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the tradit...
Kaiyu Wan, Vasu S. Alagar
ISSE
2006
13 years 8 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy
ACISP
1998
Springer
14 years 8 days ago
A Solution to Open Standard of PKI
PKI Public Key Infrastructure is fundamental for many security applications on the network. However, there are so many di erent kinds of PKI at current stage and they are not comp...
Qi He, Katia P. Sycara, Zhongmin Su
COMCOM
2008
104views more  COMCOM 2008»
13 years 7 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...