Sciweavers

561 search results - page 38 / 113
» Remote Access Security Issues
Sort
View
ESSOS
2011
Springer
13 years 2 months ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr
VRML
1999
ACM
14 years 3 months ago
VR-LAB - A Distributed Multi-User Environment for Educational Purposes and Presentations
Distributed work is becoming a major issue for a large part of the work force and distributed collaborative research has almost become the norm. Consequently, distributed communic...
Dieter W. Fellner, Armin Hopp
VLDB
2007
ACM
187views Database» more  VLDB 2007»
14 years 11 months ago
Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly...
Radu Sion
INFOCOM
2008
IEEE
14 years 5 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan
PERCOM
2003
ACM
14 years 10 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...