Sciweavers

2178 search results - page 233 / 436
» Toward Systemically Secure IT Architectures
Sort
View
196
Voted
DBSEC
2011
245views Database» more  DBSEC 2011»
14 years 6 months ago
Multilevel Secure Data Stream Processing
Abstract. With sensors and mobile devices becoming ubiquitous, situation monitoring applications are becoming a reality. Data Stream Management Systems (DSMSs) have been proposed t...
Raman Adaikkalavan, Indrakshi Ray, Xing Xie
133
Voted
WIAS
2010
102views more  WIAS 2010»
15 years 1 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
113
Voted
IWCMC
2009
ACM
15 years 10 months ago
WMNSec: security for wireless mesh networks
Wireless Mesh Networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructure. However, WMN security has not been covered adequ...
Georg Lukas, Christian Fackroth
ICPPW
2005
IEEE
15 years 9 months ago
The Clarens Web Service Framework for Distributed Scientific Analysis in Grid Projects
Large scientific collaborations are moving towards service oriented architectures for implementation and deployment of globally distributed systems. Clarens is a high performance,...
Frank van Lingen, Conrad Steenberg, Michael Thomas...
124
Voted
ISW
2009
Springer
15 years 10 months ago
MAC Precomputation with Applications to Secure Memory
We present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, Sh...
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan