Sciweavers

1801 search results - page 94 / 361
» Implementation-Oriented Secure Architectures
Sort
View
CODES
2007
IEEE
14 years 2 months ago
A data protection unit for NoC-based architectures
Security is gaining increasing relevance in the development of embedded devices. Towards a secure system at each level of design, this paper addresses the security aspects related...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
ISPEC
2007
Springer
14 years 2 months ago
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems
Considerable research and experiment results in recent years have shown that the server-proxy-user architecture represents an efficient and scalable new paradigm for multimedia con...
Robert H. Deng, Yanjiang Yang
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
14 years 14 days ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
ESORICS
1992
Springer
14 years 5 days ago
ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis
After a brief survey of the problems related to audit trail analysis and of some approaches to deal with them, the paper outlines the project ASAX which aims at providing an advanc...
Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji...
ENTCS
2006
140views more  ENTCS 2006»
13 years 8 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...