Sciweavers

2178 search results - page 205 / 436
» Toward Systemically Secure IT Architectures
Sort
View
SIGMOD
2006
ACM
142views Database» more  SIGMOD 2006»
14 years 9 months ago
Model driven development of secure XML databases
In this paper, we propose a methodological approach for the model driven development of secure XML databases (DB). This proposal is within the framework of MIDAS, a model driven m...
Belén Vela, Eduardo Fernández-Medina, Esperanza ...
CONEXT
2008
ACM
13 years 11 months ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
JAR
2008
115views more  JAR 2008»
13 years 9 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
ISF
2008
114views more  ISF 2008»
13 years 9 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
NORDSEC
2009
Springer
14 years 4 months ago
A Parallelism-Based Approach to Network Anonymization
Considering topologies of anonymous networks we used to organizing anonymous communications into hard to trace paths, composed of several middleman nodes, towards hiding communicat...
Igor Margasinski