Sciweavers

1597 search results - page 81 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
IEEEARES
2008
IEEE
14 years 4 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
IWCMC
2006
ACM
14 years 4 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
MMS
2006
13 years 10 months ago
qWixP, a Qt-based, Wireless Information Exchange Platform
: Due to technological advances, wireless personal digital assistants (PDAs) are becoming quite popular. However, it seems as if none of the existing applications fully exploits th...
Ralf Salomon, Holger Harms, Frank Reichenbach, Tho...
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
14 years 3 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
DKE
2002
118views more  DKE 2002»
13 years 10 months ago
Consistent policy enforcement in distributed systems using mobile policies
This paper briefly traces the evolution of information system architectures from mainframe-connected terminals to distributed multi-tier architectures. It presents the challenges ...
Susan Chapin, Donald B. Faatz, Sushil Jajodia, Amg...