Sciweavers

2846 search results - page 108 / 570
» Not one click for security
Sort
View
JSW
2007
116views more  JSW 2007»
15 years 4 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...
NORDSEC
2009
Springer
15 years 11 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
ICMB
2005
IEEE
101views Business» more  ICMB 2005»
15 years 10 months ago
Mobile Ticketing System Employing TrustZone Technology
Security in mobile commerce is becoming more important due to increasing demand from users wishing to perform online transactions over mobile devices. Security is one of the criti...
Wan Huzaini Wan Hussin, Paul Coulton, Reuben Edwar...
RAID
1999
Springer
15 years 8 months ago
SNMS - Shadow Network Management System
Putting in more security measures and access controls within an organisation runs contrary to operational e ciency and convenience. Although the balance between security and opera...
Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Chr...
CCS
2008
ACM
15 years 6 months ago
VEP: a virtual machine for extended proof-carrying code
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating the proofs which are inherently larg...
Heidar Pirzadeh, Danny Dubé