Sciweavers

3605 search results - page 169 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
NBIS
2009
Springer
14 years 2 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
VIZSEC
2004
Springer
14 years 1 months ago
NVisionIP: netflow visualizations of system state for security situational awareness
The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble k...
Kiran Lakkaraju, William Yurcik, Adam J. Lee
OOPSLA
2000
Springer
13 years 11 months ago
An approach to safe object sharing
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-oriented...
Ciarán Bryce, Chrislain Razafimahefa
POLICY
2009
Springer
14 years 2 months ago
XACML Policy Profile for Multidomain Network Resource Provisioning and Supporting Authorisation Infrastructure
—Policy definition is an important component of the consistent authorisation service infrastructure that could be effectively integrated with the general resource provisioning wo...
Yuri Demchenko, Mihai Cristea, Cees de Laat
PERCOM
2005
ACM
14 years 7 months ago
Link Layer Security for SAHN Protocols
Abstract-- Wireless networks are at risk of security attacks since transmissions can be intercepted by anyone within the transmission range. Therefore participating entities should...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp