Sciweavers

537 search results - page 5 / 108
» The Saga Security System: A Security Architecture for Open D...
Sort
View
ESORICS
2002
Springer
14 years 8 months ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...
ACSAC
2001
IEEE
14 years 13 days ago
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...
Bernd Blobel
ISSE
2006
13 years 8 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy
HPCA
2011
IEEE
13 years 15 days ago
Architectural framework for supporting operating system survivability
The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attack...
Xiaowei Jiang, Yan Solihin
AICT
2010
IEEE
240views Communications» more  AICT 2010»
13 years 12 days ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...