Sciweavers

2517 search results - page 247 / 504
» Secure Deployment of Components
Sort
View
126
Voted
CSMR
1998
IEEE
15 years 6 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
111
Voted
CORR
2010
Springer
90views Education» more  CORR 2010»
15 years 2 months ago
RFID Applications: An Introductory and Exploratory Study
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use R...
Kamran Ahsan, Hanifa Shah, Paul Kingston
112
Voted
IDTRUST
2009
ACM
15 years 9 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
INFOCOM
2006
IEEE
15 years 8 months ago
Session Privacy Enhancement by Traffic Dispersion
— Traditional network routing uses the single (shortest) path paradigm. This paradigm leaves the session vulnerable to a variety of security threats, such as eavesdropping. We pr...
Haim Zlatokrilov, Hanoch Levy
136
Voted
JCP
2007
154views more  JCP 2007»
15 years 2 months ago
Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures
—The computational Grid concept is gaining great popularity as the best way to deliver access to a wide range of distributed computing and data resources. But, as Grids move from...
Francesco Palmieri