Sciweavers

2207 search results - page 99 / 442
» Security at the Internet Layer
Sort
View
GLOBECOM
2006
IEEE
15 years 10 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
ISSA
2008
15 years 5 months ago
The Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
Frankie Tvrz, Marijke Coetzee
B
2007
Springer
15 years 8 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
WCRE
1999
IEEE
15 years 8 months ago
A Tool for Securely Integrating Legacy Systems into a Distributed Environment
Legacy systems provide services that remain useful beyond the means of the technology in which they were originally implemented. Our Legacy Wrapper tool packages the services of a...
Timothy S. Souder, Spiros Mancoridis
DBSEC
2001
129views Database» more  DBSEC 2001»
15 years 5 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu