Sciweavers

5665 search results - page 216 / 1133
» Introduction to Computer Security
Sort
View
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
14 years 5 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
EDOC
2005
IEEE
14 years 4 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
ICN
2005
Springer
14 years 3 months ago
Securing Layer 2 in Local Area Networks
Abstract. Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data Link Layer (Layer 2) security has not bee...
Hayriye Altunbasak, Sven Krasser, Henry L. Owen, J...
WS
2004
ACM
14 years 3 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
EDOC
2003
IEEE
14 years 3 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...