Sciweavers

378 search results - page 48 / 76
» Security requirement analysis of business processes
Sort
View
CRITIS
2009
13 years 8 months ago
Towards Early Warning Systems - Challenges, Technologies and Architecture
We present the architecture of an automatic early warning system (EWS) that aims at providing predictions and advice regarding security threats in information and communication tec...
Martin Apel, Joachim Biskup, Ulrich Flegel, Michae...
ICDCS
2011
IEEE
12 years 7 months ago
LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks
—Code dissemination in wireless sensor networks refers to the process of disseminating a new code image via wireless links to all sensor nodes after they are deployed. It is desi...
Rui Zhang 0007, Yanchao Zhang
NOMS
1998
IEEE
160views Communications» more  NOMS 1998»
13 years 12 months ago
SP-to-SP service ordering specification and its implementation
Network Management Forum (NMF) has defined a set of basic business processes dealing with major TMN service management functions such as performance management, fault management, b...
Graham Chen, Qinzheng Kong, Pierre-Yves Benain
ICASSP
2010
IEEE
13 years 7 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
14 years 2 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin