Sciweavers

2207 search results - page 97 / 442
» Security at the Internet Layer
Sort
View
CCGRID
2001
IEEE
15 years 8 months ago
Charging Distributed Services of a Computational Grid Architecture
Charging of services in a distributed system will become more and more important for systems which are utilized commercially. Such an important distributed system exists in form o...
Burkhard Stiller, Jan Gerke, Placi Flury, Peter Re...
IJNSEC
2008
146views more  IJNSEC 2008»
15 years 4 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li

Lecture Notes
404views
17 years 2 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
ACSAC
2009
IEEE
15 years 11 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
SOUPS
2006
ACM
15 years 10 months ago
Protecting domestic power-line communications
– In this paper we describe the protection goals and mechanisms in HomePlug AV, a next-generation power-line communications standard. This is a fascinating case-history in securi...
Richard E. Newman, Sherman Gavette, Larry Yonge, R...