Sciweavers

2951 search results - page 134 / 591
» Secure Distributed DNS
Sort
View
98
Voted
EDOC
2005
IEEE
15 years 8 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
ICPADS
2005
IEEE
15 years 8 months ago
An Adaptive Multiparty Protocol for Secure Data Protection
To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui T...
114
Voted
NSPW
2004
ACM
15 years 8 months ago
Towards agile security assurance
Agile development methodologies are gaining acceptance in the software industry. If they are to be used for constructing securitycritical solutions, what do we do about assurance?...
Konstantin Beznosov, Philippe Kruchten
IWAN
2004
Springer
15 years 8 months ago
Secure, Customizable, Many-to-One Communication
Concast is a customizable many-to-one network-layer communication service. Although programmable services like concast can improve the efficiency of group applications, accompanyi...
Kenneth L. Calvert, Jim Griffioen, Billy Mullins, ...
EDOC
2003
IEEE
15 years 8 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...