Sciweavers

6137 search results - page 146 / 1228
» Securing Collaborative Applications
Sort
View
ISDA
2008
IEEE
14 years 3 months ago
Towards a Suitable Reconciliation of the Findings in Collaborative Fuzzy Clustering
This study is concerned with the application of multi-objective particle swarm optimization (MOPSO) approaches to the framework of collaborative fuzzy clustering. In particular, t...
Rafael Falc, Benoît Depaire, Koen Vanhoof, A...
PEWASUN
2005
ACM
14 years 2 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari
SPW
2005
Springer
14 years 2 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
CIKM
2010
Springer
13 years 7 months ago
Towards a data-centric view of cloud security
Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines...
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhu...
IEEESP
2011
13 years 15 days ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...