Sciweavers

2178 search results - page 135 / 436
» Toward Systemically Secure IT Architectures
Sort
View
ISCAPDCS
2004
13 years 10 months ago
Mobile Agent Data Integrity Using Multi-agent Architecture
Protection of agent data state and partial results in mobile agent systems continues to draw research interest. Current solutions to integrity attacks are geared at detection of m...
J. Todd McDonald, Alec Yasinsac, Willard C. Thomps...
OTM
2005
Springer
14 years 2 months ago
An Hybrid Intermediation Architectural Approach for Integrating Cross-Organizational Services
Nowadays, workflow research has shifted from fundamentals of workflow modelling and enactment towards improvement of the workflow modelling lifecycle and integration of workflow en...
Giannis Verginadis, Panagiotis Gouvas, Gregoris Me...
WISA
2004
Springer
14 years 2 months ago
Hyperelliptic Curve Coprocessors on a FPGA
Abstract. Cryptographic algorithms are used in a large variety of different applications to ensure security services. It is, thus, very interesting to investigate various implement...
Howon Kim, Thomas J. Wollinger, YongJe Choi, Kyoil...
ACSAC
2005
IEEE
14 years 2 months ago
A User-level Framework for Auditing and Monitoring
Logging and auditing is an important system facility for monitoring correct system operation and for detecting potential security problems. We present an architecture for implemen...
Yongzheng Wu, Roland H. C. Yap
SIGCOMM
2012
ACM
11 years 11 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...