Sciweavers

393 search results - page 29 / 79
» Security Architectures for Controlled Digital Information Di...
Sort
View
MDM
2001
Springer
148views Communications» more  MDM 2001»
13 years 12 months ago
An Agent-Based Architecture Using XML for Mobile Federated Database Systems
We advocate the use of agents to model a system that allows us to integrate and protect information stored in both mobile and fixed devices, while trying to preserve a consistent a...
Carlos Sánchez, Le Gruenwald
IEEEARES
2008
IEEE
14 years 1 months ago
A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications
As more and more information becomes accessible via on-line databases, more public services can be provided and more complex queries involving several registers become feasible as...
Jan Willemson, Arne Ansper
ICS
2003
Tsinghua U.
14 years 18 days ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
CRITIS
2008
13 years 9 months ago
Testbeds for Assessing Critical Scenarios in Power Control Systems
Abstract. The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility Infrastructur...
Giovanna Dondossola, Geert Deconinck, Fabrizio Gar...
SACMAT
2003
ACM
14 years 20 days ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng