Sciweavers

330 search results - page 15 / 66
» SKMA: a key management architecture for SCADA systems
Sort
View
ITNG
2010
IEEE
14 years 3 months ago
Conceptual Elaboration of a Geographic Intelligence Based on Service Oriented Architecture (SOA)
This paper, the first in a series of four, presents the conceptual design of a subsystem with integrative function based on a Service-Oriented Architecture (SOA), named Geographic...
Fernando Maciel Lima e Sousa, Valdevino Siqueira C...
DAC
2009
ACM
13 years 8 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
IJNSEC
2006
200views more  IJNSEC 2006»
13 years 10 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
ICNS
2008
IEEE
14 years 4 months ago
SLA Monitoring and Management Framework for Telecommunication Services
This paper presents SLA monitoring and management framework for telecommunication services. The basic requirements of this class of systems are specified and verified in context o...
Jacek Kosinski, Piotr Nawrocki, Dominik Radziszows...
ICOODB
2010
171views Database» more  ICOODB 2010»
13 years 8 months ago
Data Model Driven Implementation of Web Cooperation Systems with Tricia
Abstract. We present the data modeling concepts of Tricia, an opensource Java platform used to implement enterprise web information systems as well as social software solutions inc...
Thomas Büchner, Florian Matthes, Christian Ne...