Sciweavers

2904 search results - page 35 / 581
» Internet Infrastructure Security
Sort
View
SP
2000
IEEE
121views Security Privacy» more  SP 2000»
14 years 2 months ago
A Security Infrastructure for Distributed Java Applications
We describe the design and implementation of a security infrastructure for a distributed Java application. This work is inspired by SDSI/SPKI, but has a few twists of its own. We ...
Dirk Balfanz, Drew Dean, Mike Spreitzer
WORM
2004
13 years 11 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
ACSAC
2001
IEEE
14 years 1 months ago
Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce
The perceived lack of security in the wireless environment has delayed many initiatives in providing access to ecommerce applications from wireless devices. Many organizations are...
Paul Ashley, Heather M. Hinton, Mark Vandenwauver
HICSS
2010
IEEE
178views Biometrics» more  HICSS 2010»
14 years 4 months ago
Desperately Seeking the Infrastructure in IS Research: Conceptualization of "Digital Convergence" As Co-Evolution of Social and
Large scale penetration of digital technologies led them to join roads, electricity, and water distribution, as essential infrastructures of modernity. “Digital convergence” r...
David Tilson, Kalle Lyytinen, Carsten Søren...
CSI
2008
113views more  CSI 2008»
13 years 10 months ago
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
VANETs have the potential to dramatically increase road safety by giving drivers more time to react adequately to dangerous situations. To prevent abuse of VANETs, a security infra...
Klaus Plößl, Hannes Federrath