Sciweavers

CSREASAM
2004
14 years 1 months ago
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures
We model a private key's life cycle as a finite state machine. The states are the key's phases of life and the transition functions describe tasks to be done with the key...
Alexander Wiesmaier, Marcus Lippert, Vangelis Kara...
CSREASAM
2004
14 years 1 months ago
Tolerating Intrusions in Grid Systems
Grid systems are designed to support very large data set computations, that potentially access significant resources spread through several organizations. These resources can be v...
Luis Sardinha, Nuno Ferreira Neves, Paulo Ver&iacu...
CSREASAM
2004
14 years 1 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal
CSREASAM
2004
14 years 1 months ago
Survivable Systems Analysis of the North American Power Grid Communications Infrastructure
The modern electric power grid is a complex interconnected network of independent physical and electronic devices that utilize myriad technologies for communication between other ...
Patrick R. Merry, Axel W. Krings, Paul W. Oman
CSREASAM
2004
14 years 1 months ago
A Unified Framework for Mobile Device Security
: Present-day handheld devices, such as PDAs, are a useful blend of hardware and software oriented toward the mobile workforce. While they provide the capability to review document...
Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev
CSREASAM
2004
14 years 1 months ago
An Architectural Framework for Distributed Intrusion Detection Using Smart Agents
Vasilis Chatzigiannakis, Georgios Androulidakis, M...