Sciweavers

1597 search results - page 125 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
PCI
2005
Springer
14 years 2 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
DIALM
1999
ACM
150views Algorithms» more  DIALM 1999»
14 years 1 months ago
Mobile computing in next generation wireless networks
In this paper, we attempt to describe the evolving status of wireless communications and its impact on the future of mobile computing. We present a historical perspective and eluc...
Prathima Agrawal, David Famolari
ISM
2008
IEEE
137views Multimedia» more  ISM 2008»
14 years 3 months ago
A Semantics- and Data-Driven SOA for Biomedical Multimedia Systems
Due to the problems of heterogeneous data and platforms, abundant functional and QoS requirements, high data size, and tangling correlation between data/contents and software func...
Shih-Hsi Liu, Yu Cao, Ming Li, Pranay Kilaru, Thel...
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 9 months ago
Turning Cluster Management into Data Management: A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt
CSFW
2009
IEEE
14 years 4 months ago
Achieving Security Despite Compromise Using Zero-knowledge
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This pa...
Michael Backes, Martin P. Grochulla, Catalin Hritc...