Sciweavers

561 search results - page 39 / 113
» Remote Access Security Issues
Sort
View
COMCOM
2008
104views more  COMCOM 2008»
13 years 10 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
ATAL
2004
Springer
14 years 4 months ago
Demonstration of the Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 3 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
ACSAC
2004
IEEE
14 years 2 months ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman
ISPEC
2005
Springer
14 years 4 months ago
A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications
Abstract. Access control is a system-wide concern that has both a generic nature and an application dependent characteristic. It is generic as many functions must be protected with...
Kung Chen, Chih-Mao Huang