Sciweavers

2337 search results - page 66 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
IWCMC
2009
ACM
14 years 2 months ago
WMNSec: security for wireless mesh networks
Wireless Mesh Networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructure. However, WMN security has not been covered adequ...
Georg Lukas, Christian Fackroth
VLDB
1998
ACM
134views Database» more  VLDB 1998»
13 years 12 months ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
CIDR
2007
79views Algorithms» more  CIDR 2007»
13 years 9 months ago
Beyond Just Data Privacy
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...
Bob Mungamuru, Hector Garcia-Molina
CCR
2010
152views more  CCR 2010»
13 years 5 months ago
CYBEX: the cybersecurity information exchange framework (x.1500)
The cybersecurity information exchange framework, known as CYBEX, is currently undergoing its first iteration of standardization efforts within ITU-T. The framework describes how ...
Anthony M. Rutkowski, Youki Kadobayashi, Inette Fu...