Sciweavers

97 search results - page 12 / 20
» Implementing a Secure Autonomous Bootstrap Mechanism for Con...
Sort
View
CCS
2010
ACM
13 years 7 months ago
Demonstrating cognitive packet network resilience to worm attacks
The need for network stability and reliability has led to the growth of autonomic networks [2] that can provide more stable and more reliable communications via on-line measuremen...
Georgia Sakellari, Erol Gelenbe
CMS
2003
171views Communications» more  CMS 2003»
13 years 8 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
SAC
2004
ACM
14 years 25 days ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...
LCN
2008
IEEE
14 years 1 months ago
Firewalling wireless sensor networks: Security by wireless
—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired sys...
Ivan Martinovic, Nicos Gollan, Jens B. Schmitt
CSREASAM
2006
13 years 8 months ago
Role Based Access Control and the JXTA Peer-to-Peer Framework
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a securit...
Amit Mathur, Suneuy Kim, Mark Stamp