Sciweavers

434 search results - page 69 / 87
» Security Documentation
Sort
View
CIIT
2004
132views Communications» more  CIIT 2004»
13 years 9 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
SIS
2004
13 years 9 months ago
Semantic Interoperability of Authorizations
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this s...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
CRITIS
2009
13 years 8 months ago
Energy Theft in the Advanced Metering Infrastructure
Abstract. Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an adva...
Stephen E. McLaughlin, Dmitry Podkuiko, Patrick Mc...
EUROPKI
2009
Springer
13 years 5 months ago
A Computational Framework for Certificate Policy Operations
The trustworthiness of any Public Key Infrastructure (PKI) rests upon the expectations for trust, and the degree to which those expectations are met. Policies, whether implicit as ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
MOC
2010
13 years 2 months ago
Optimization algorithm for reconstructing interface changes of a conductivity inclusion from modal measurements
In this paper, we propose an original optimization approach for reconstructing interface changes of a conductivity inclusion from measurements of eigenvalues and eigenvectors asso...
Habib Ammari, Elena Beretta, Elisa Francini, Hyeon...