Sciweavers

2560 search results - page 28 / 512
» Securing VO Management
Sort
View
117
Voted
MMNS
2007
133views Multimedia» more  MMNS 2007»
15 years 4 months ago
Distributed Self Fault-Diagnosis for SIP Multimedia Applications
IP real-time multimedia applications present a challenging environment for network and service management, which requires a new approach. DYSWIS (Do You See What I See), proposed i...
Kai X. Miao, Henning Schulzrinne, Vishal Kumar Sin...
ISI
2007
Springer
15 years 8 months ago
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises
– The difficulty in managing security threats and vulnerabilities for small and medium-sized enterprises (SME) is investigated. A detailed conceptual framework for asset and thre...
Cyril Onwubiko, Andrew P. Lenaghan
145
Voted
ICDS
2009
IEEE
15 years 9 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton
106
Voted
CCS
2010
ACM
15 years 2 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
122
Voted
IDTRUST
2010
ACM
15 years 9 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier