Sciweavers

4263 search results - page 93 / 853
» Network Security
Sort
View
136
Voted
APNOMS
2006
Springer
15 years 6 months ago
A Zeroconf Approach to Secure and Easy-to-Use Remote Access to Networked Appliances
In this paper, we propose a new approach to secure and easy-to-use remote access to networked appliances (NAs). Based on the proposed approach, we develop a system in which servers...
Kiyohito Yoshihara, Toru Maruta, Hiroki Horiuchi
ACSAC
1997
IEEE
15 years 6 months ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford
CSREASAM
2003
15 years 4 months ago
Assessing Power Substation Network Security and Survivability: A Work in Progress Report
This paper reports our experiences with identifying cyber-based threats to the survivability of power substation control networks. Observations from the initial application of vul...
Carol Taylor, Paul W. Oman, Axel W. Krings
91
Voted
WIOPT
2005
IEEE
15 years 8 months ago
Securing Route Optimisation in NEMO
The Network Mobility (NEMO) Basic Support protocol enables mobile networks to change their point of attachment to the Internet, while preserving established sessions of the nodes ...
María Calderón, Carlos Jesus Bernard...
125
Voted
POLICY
2009
Springer
15 years 9 months ago
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
Yuu-Heng Cheng, Mariana Raykova, Alexander Poylish...