Sciweavers

2178 search results - page 135 / 436
» Toward Systemically Secure IT Architectures
Sort
View
141
Voted
ISCAPDCS
2004
15 years 4 months ago
Mobile Agent Data Integrity Using Multi-agent Architecture
Protection of agent data state and partial results in mobile agent systems continues to draw research interest. Current solutions to integrity attacks are geared at detection of m...
J. Todd McDonald, Alec Yasinsac, Willard C. Thomps...
OTM
2005
Springer
15 years 8 months ago
An Hybrid Intermediation Architectural Approach for Integrating Cross-Organizational Services
Nowadays, workflow research has shifted from fundamentals of workflow modelling and enactment towards improvement of the workflow modelling lifecycle and integration of workflow en...
Giannis Verginadis, Panagiotis Gouvas, Gregoris Me...
123
Voted
WISA
2004
Springer
15 years 8 months ago
Hyperelliptic Curve Coprocessors on a FPGA
Abstract. Cryptographic algorithms are used in a large variety of different applications to ensure security services. It is, thus, very interesting to investigate various implement...
Howon Kim, Thomas J. Wollinger, YongJe Choi, Kyoil...
123
Voted
ACSAC
2005
IEEE
15 years 9 months ago
A User-level Framework for Auditing and Monitoring
Logging and auditing is an important system facility for monitoring correct system operation and for detecting potential security problems. We present an architecture for implemen...
Yongzheng Wu, Roland H. C. Yap
156
Voted
SIGCOMM
2012
ACM
13 years 5 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...