Sciweavers

211 search results - page 34 / 43
» Integrity Protection for Revision Control
Sort
View
ACSAC
2001
IEEE
14 years 2 days ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
DSN
2009
IEEE
14 years 3 months ago
Data management mechanisms for embedded system gateways
It is becoming increasingly common to connect traditional embedded system networks to the Internet for remote monitoring, high-level control and integration. It is necessary to pr...
Justin Ray, Philip Koopman
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 2 months ago
Service Level Agreement Framework for Differentiated Survivability in GMPLS-based IP-over-Optical Networks
Abstract: In the next generation optical internet, GMPLSbased IP-over-optical networks, ISPs will be required to support a wide variety of applications each having their own requir...
David Harle, Saud Albarrak, Fuead Ali, Anna Urra, ...
DSN
2005
IEEE
14 years 2 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
SENSYS
2005
ACM
14 years 2 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...