Sciweavers

859 search results - page 109 / 172
» Security for Key Management Interfaces
Sort
View
ISI
2006
Springer
13 years 10 months ago
The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment
We present an overview of our work in information fusion for intelligence analysis. This work includes the Hats Simulator and the COLAB system. The Hats Simulator is a parameterize...
Clayton T. Morrison, Paul R. Cohen
JSW
2007
90views more  JSW 2007»
13 years 9 months ago
Fine-Grained and Scalable Message Protection in Sensitive Organizations
Abstract— Today electronic messaging services are indispensable to individuals and organizations. If a message contains sensitive information, the integrity and confidentiality ...
Joon S. Park, Ganesh Devarajan
CCS
2011
ACM
12 years 10 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...
VIZSEC
2007
Springer
14 years 4 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
WS
2004
ACM
14 years 3 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell