Sciweavers

115 search results - page 15 / 23
» Infrastructure: A Prerequisite for Effective Security
Sort
View
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
14 years 1 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
MOBICOM
1996
ACM
14 years 23 days ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
IWCMC
2006
ACM
14 years 2 months ago
Resolving islands of security problem for DNSSEC
The DNS Security Extensions (DNSSEC) were developed to add origin authentication and integrity. DNSSEC defined a public key infrastructure over DNS tree hierarchy for the public ...
Eunjong Kim, Ashish Gupta, Batsukh Tsendjav, Danie...
AISS
2010
165views more  AISS 2010»
13 years 6 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
IEEEARES
2009
IEEE
14 years 3 months ago
Revealing the Calling History of SIP VoIP Systems by Timing Attacks
Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP s...
Ge Zhang, Simone Fischer-Hübner, Leonardo A. ...