Sciweavers

2178 search results - page 33 / 436
» Toward Systemically Secure IT Architectures
Sort
View
HIPEAC
2005
Springer
14 years 1 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
ACSW
2006
13 years 9 months ago
SKMA: a key management architecture for SCADA systems
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently...
Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel ...
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
14 years 2 months ago
Implementation-Oriented Secure Architectures
We propose a framework for constructing secure systems at the architectural level. This framework is composed of an implementation-oriented formalization of a system’s architect...
Daniel Conte de Leon, Jim Alves-Foss, Paul W. Oman
INDOCRYPT
2009
Springer
14 years 2 months ago
Towards Secure and Practical MACs for Body Sensor Networks
Wireless sensor network (WSN) commonly requires lower level security for public information gathering, whilst body sensor network (BSN) must be secured with strong authenticity to...
Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zh...
ICC
2009
IEEE
112views Communications» more  ICC 2009»
14 years 2 months ago
Towards Secure Spectrum Decision
—The key idea of dynamic spectrum access (DSA) networks is to allow the secondary, unlicensed users to detect and use unused portions of the spectrum (white spaces) opportunistic...
Goce Jakimoski, K. P. Subbalakshmi