Sciweavers

2517 search results - page 238 / 504
» Secure Deployment of Components
Sort
View
IJNSEC
2006
270views more  IJNSEC 2006»
15 years 2 months ago
Efficient Key Agreement for Large and Dynamic Multicast Groups
Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The ...
Liming Wang, Chuan-Kun Wu
102
Voted
JNW
2007
135views more  JNW 2007»
15 years 2 months ago
Access Control in Decentralised Publish/Subscribe Systems
Abstract— Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
184
Voted
IFIPTM
2010
204views Management» more  IFIPTM 2010»
15 years 1 months ago
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement
Enforcing complex policies that span organizational domains is an open challenge. Current work on SOA policy enforcement splits security in logical components that can be distribut...
Gabriela Gheorghe, Stephan Neuhaus, Bruno Crispo
118
Voted
SIGCOMM
2009
ACM
15 years 9 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
168
Voted
SOUPS
2010
ACM
15 years 6 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan