Sciweavers

964 search results - page 37 / 193
» On Securely Scheduling a Meeting
Sort
View
COMSWARE
2008
IEEE
14 years 5 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
14 years 5 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
CLUSTER
2002
IEEE
14 years 3 months ago
A New Architecture for Secure Carrier-Class Clusters
Traditionally, the telecom industry has used clusters to meet its carrier-class requirements of high availability, reliability, and scalability, while relying on cost-effective ha...
Makan Pourzandi, Ibrahim Haddad, Charles Levert, M...
IIWAS
2007
14 years 11 days ago
Security aspects in Semantic Web Services Filtering
Security and trust aspects, perceived as difficult to quantify, have been neglected in various service interactions. However, factors related to security and trust are in fact cru...
Witold Abramowicz, Andreas Ekelhart, Stefan Fenz, ...
IWUC
2004
14 years 10 days ago
Protecting People on the Move through Virtual Personal Security
Ensuring personal safety for people on the move is becoming a heightened priority in today's uncertain environment. Traditional approaches are no longer adequate in meeting ri...
Dadong Wan, Anatole Gershman