Sciweavers

653 search results - page 14 / 131
» Security Architecture for Federated Cooperative Information ...
Sort
View
SACMAT
2005
ACM
14 years 1 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
IDEAL
2005
Springer
14 years 1 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
DISCEX
2003
IEEE
14 years 29 days ago
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer
This paper proposes several integrated security architecture designs for client-server group communication systems. In an integrated architecture, security services are implemente...
Yair Amir, Cristina Nita-Rotaru, Jonathan Robert S...
SAC
2010
ACM
13 years 6 months ago
Cooperation enablement for centralistic early warning systems
From large-scale acquisition of information on security incidents by early warning systems (EWS) arises the opportunity to draw up a situation picture that allows detection of tre...
Ulrich Flegel, Johannes Hoffmann, Michael Meier
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
14 years 2 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron