Sciweavers

2560 search results - page 46 / 512
» Securing VO Management
Sort
View
134
Voted
IPPS
2008
IEEE
15 years 9 months ago
The design of a versatile, secure P2PSIP communications architecture for the public internet
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
David A. Bryan, Bruce Lowekamp, Marcia Zangrilli
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
15 years 9 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
122
Voted
DEBU
2007
131views more  DEBU 2007»
15 years 2 months ago
Future Trends in Secure Chip Data Management
Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with strong security requirements. Secure chips host personal data that must be care...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
CCS
2001
ACM
15 years 7 months ago
Formalizing GDOI group key management requirements in NPATRL
Although there is a substantial amount of work on formal requirements for two and three-party key distribution protocols, very little has been done on requirements for group proto...
Catherine Meadows, Paul F. Syverson
119
Voted
CISC
2006
Springer
124views Cryptology» more  CISC 2006»
15 years 6 months ago
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provid...
Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon...