Sciweavers

478 search results - page 54 / 96
» Secure Sockets Layer
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
GCC
2003
Springer
14 years 24 days ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
ACSAC
2002
IEEE
14 years 17 days ago
Security Architecture of the Austrian Citizen Card Concept
When admitting electronic media as a means for citizens to approach public authorities – i.e., when advancing official proceedings towards e-Government – security is an indisp...
Herbert Leitold, Arno Hollosi, Reinhard Posch
IEEESP
2006
130views more  IEEESP 2006»
13 years 7 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
INFOCOM
2007
IEEE
14 years 1 months ago
The Causal Factors Behind Internet Power-Law Connectivity
— In this paper, we investigate the impact of layer-2 devices on our perception of the Internet IP topology and on the performance and security of the Internet. We make the case ...
Sangmin Kim, Khaled Harfoush