Sciweavers

653 search results - page 22 / 131
» Security Architecture for Federated Cooperative Information ...
Sort
View
EIT
2008
IEEE
14 years 2 months ago
Architectural support for securing application data in embedded systems
—The rapid growth and pervasive use of embedded systems makes it easier for an adversary to gain physical access to these devices to launch attacks and reverse engineer of the sy...
Olga Gelbart, Eugen Leontie, Bhagirath Narahari, R...
ACMSE
2006
ACM
14 years 1 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
ECIS
2004
13 years 9 months ago
Agile Security For Information Warfare: A Call For Research
The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly ...
Richard Baskerville
ELPUB
2008
ACM
13 years 9 months ago
A Semantic Web Powered Distributed Digital Library System
ResearchinHumanitiesandSocialSciencesistraditionallybasedonprintedpublicationssuchasmanuscripts, personal correspondence, first editions and other types of documents which are oft...
Michele Nucci, Michele Barbera, Christian Morbidon...
JCP
2008
131views more  JCP 2008»
13 years 7 months ago
Multi-Index Cooperative Mixed Strategy for Service Selection Problem in Service-Oriented Architecture
Under the environment of Service-Oriented Architecture (SOA), service users have to decide how to choose the proper provider from the candidates to obtain optimal service level. Th...
Yimin Shen, Jing Zhang, Yushun Fan