Sciweavers

1116 search results - page 24 / 224
» Secure Mediation: Requirements and Design
Sort
View
ISSE
2006
13 years 9 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy
PADS
2005
ACM
14 years 2 months ago
Requirements on Worm Mitigation Technologies in MANETS
This study presents an analysis of the impact of mitigation on computer worm propagation in Mobile Ad-hoc Networks (MANETS). According to the recent DARPA BAA Defense Against Cybe...
Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andr...
JVA
2006
IEEE
14 years 3 months ago
Programming Models for Grid Applications and Systems: Requirements and Approaches
History repeats itself. Since the invention of the programmable computer, numerous computer scientists keep dedicating their professional lives to the design of “the single, bes...
Thilo Kielmann
EFDBS
2001
13 years 10 months ago
Evolving Hybrid Distributed Databases: Architecture and Methodology
Abstract. This paper focuses on the interoperability of autonomous legacy databases with the idea of meeting the future requirements of an organization. It describes a general arch...
Philippe Thiran, Jean-Luc Hainaut
CSREAESA
2008
13 years 10 months ago
Security Observance throughout the Life-Cycle of Embedded Systems
- Embedded systems are an established part of life. Their security requirements underline the importance of properly formulated, implemented, and enforced security policies through...
S. Hasan Mirjalili, Arjen K. Lenstra