Sciweavers

2560 search results - page 45 / 512
» Securing VO Management
Sort
View
101
Voted
ISW
1997
Springer
15 years 6 months ago
Practice-Oriented Provable-Security
Mihir Bellare
CCS
2009
ACM
16 years 3 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
122
Voted
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
15 years 7 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt
JUCS
2008
147views more  JUCS 2008»
15 years 2 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...
153
Voted
HPCNCS
2007
15 years 4 months ago
A Formal Approach for Identity Management in Federated Web Services
The objective of the proposed work is to formally specify and implement a federated web service model in which the identity management problem and security features are analyzed. ...
S. Chandrasekaran, C. Dinesh, Kartic Ramesh, Al. M...