Sciweavers

1970 search results - page 47 / 394
» Security Without Firewalls
Sort
View
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
14 years 3 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
IADIS
2004
13 years 11 months ago
An architecture for enterprise application integration with Web services using MDA
This paper presents an architecture for Enterprise Application Integration with Web Services through the creation of meta-models in MDA(MODEL DRIVEN ARCHITECTURE). The proposed ar...
Samyr Béliche Vale, Zair Abdelouahab
SOUPS
2009
ACM
14 years 4 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
SKG
2006
IEEE
14 years 3 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
14 years 2 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....