Sciweavers

5511 search results - page 119 / 1103
» Security for Network Places
Sort
View
ICDCSW
2008
IEEE
14 years 5 months ago
Secure Control: Towards Survivable Cyber-Physical Systems
In this position paper we investigate the security of cyberphysical systems. We (1) identify and define the problem of secure control, (2) investigate the defenses that informati...
Alvaro A. Cárdenas, Saurabh Amin, Shankar S...
POLICY
2007
Springer
14 years 4 months ago
Web Services Security: Challenges and Techniques
Web Services based computing is currently an important driver for the software industry. While several standards bodies (such as W3C and OASIS) are laying the foundation for Web S...
Anoop Singhal
CSFW
2006
IEEE
14 years 2 months ago
Types and Effects for Secure Service Orchestration
A distributed calculus is proposed for describing networks of services. We model service interaction through a call-by-property invocation mechanism, by specifying the security co...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
SIGSOFT
2007
ACM
14 years 11 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
JCM
2008
121views more  JCM 2008»
13 years 10 months ago
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks
In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nod...
Yihui Zhang, Li Xu, Xiaoding Wang