Sciweavers

561 search results - page 62 / 113
» Remote Access Security Issues
Sort
View
SISW
2005
IEEE
14 years 4 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
IJNSEC
2006
200views more  IJNSEC 2006»
13 years 11 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
ESCIENCE
2005
IEEE
14 years 4 months ago
The Common Instrument Middleware Architecture: Overview of Goals and Implementation
— Instruments and sensors and their accompanying actuators are essential to the conduct of scientific research. In many cases they provide observations in electronic format and ...
Tharaka Devadithya, Kenneth Chiu, Kianosh Huffman,...
ASWEC
2005
IEEE
14 years 28 days ago
Supporting Dynamic Software Tool Integration via Web Service-Based Components
Most software engineering tools come with fixed functionality or limited plug-in extension capabilities. Building software development environments that support truly dynamic exte...
Nelson Yap, Hau Chean Chiong, John C. Grundy, Rebe...
ICDE
2002
IEEE
141views Database» more  ICDE 2002»
15 years 9 days ago
Providing Database as a Service
In this paper, we explore a new paradigm for data management in which a third party service provider hosts "database as a service" providing its customers seamless mecha...
Balakrishna R. Iyer, Hakan Hacigümüs, Sh...