Sciweavers

1240 search results - page 219 / 248
» Trusted Design in FPGAs
Sort
View
EUROPKI
2004
Springer
14 years 1 months ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith
FIDJI
2004
Springer
14 years 1 months ago
Task-Based Access Control for Virtual Organizations
Abstract. GOLD (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) is concerned with the dynamic formation and management of virtual o...
Panos Periorellis, Savas Parastatidis
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
14 years 1 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen
SEMWEB
2004
Springer
14 years 1 months ago
On the Emergent Semantic Web and Overlooked Issues
The emergent Semantic Web, despite being in its infancy, has already received a lot of attention from academia and industry. This resulted in an abundance of prototype systems and ...
Yannis Kalfoglou, Harith Alani, W. Marco Schorlemm...
VLDB
2004
ACM
134views Database» more  VLDB 2004»
14 years 1 months ago
A Privacy-Preserving Index for Range Queries
Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in da...
Bijit Hore, Sharad Mehrotra, Gene Tsudik