Sciweavers

1597 search results - page 75 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
MSS
2000
IEEE
130views Hardware» more  MSS 2000»
14 years 1 months ago
Design for a Decentralized Security System For Network Attached Storage
T This paper describes an architecture for a secure file system based on network-attached storage that guarantees end-to-end encryption for all user data. We describe the design of...
William E. Freeman, Ethan L. Miller
KBSE
2007
IEEE
14 years 4 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
DBSEC
2011
245views Database» more  DBSEC 2011»
13 years 1 months ago
Multilevel Secure Data Stream Processing
Abstract. With sensors and mobile devices becoming ubiquitous, situation monitoring applications are becoming a reality. Data Stream Management Systems (DSMSs) have been proposed t...
Raman Adaikkalavan, Indrakshi Ray, Xing Xie
ICNS
2007
IEEE
14 years 4 months ago
A Wireless Mesh Network-based System for Hotspots Deployment and Management
— In recent years Wireless Local Area Networks (WLANs) or hotspots, as they are commonly known, have emerged as a promising networking platform to extend network connectivity in ...
Jorge Hortelano, Juan-Carlos Cano, Carlos Miguel T...
DEXA
2004
Springer
79views Database» more  DEXA 2004»
14 years 3 months ago
Querying Distributed Data in a Super-Peer Based Architecture
Data integration is a significant challenge: relevant data objects are split across multiple information sources, and often owned by different organizations. The sources represent...
Zohra Bellahsene, Mark Roantree