Sciweavers

3003 search results - page 141 / 601
» Software Security: Building Security In
Sort
View
ACSAC
2003
IEEE
14 years 3 months ago
Making Secure TCP Connections Resistant to Server Failures
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
Hailin Wu, Andrew Burt, Ramki Thurimella
EUROMICRO
2004
IEEE
14 years 1 months ago
Securing Ad hoc Routing Protocols
Ad hoc networks are subject of many recent research efforts. Especially in mobile scenarios, self-organizing networks are of high interest. While the routing aspects of mobile ad ...
Frank Kargl, Stefan Schlott, Andreas Klenk, Alfred...
ESEM
2009
ACM
14 years 1 months ago
An empirical study of security problem reports in Linux distributions
Existing studies on problem reports in open source projects focus primarily on the analysis of the general category of problem reports, or limit their attention to observations on...
Prasanth Anbalagan, Mladen A. Vouk
EDBTW
2006
Springer
14 years 4 days ago
Query Translation for XPath-Based Security Views
Abstract. Since XML is used as a storage format in an increasing number of applications, security has become an important issue in XML databases. One aspect of security is restrict...
Roel Vercammen, Jan Hidders, Jan Paredaens
IESA
2007
13 years 11 months ago
A Security Framework for Smart Ubiquitous Industrial Resources
Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distribut...
Anton Naumenko, Artem Katasonov, Vagan Y. Terziyan