Sciweavers

JDCTA
2010
125views more  JDCTA 2010»
13 years 6 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
VIROLOGY
2008
87views more  VIROLOGY 2008»
13 years 11 months ago
OpenDocument and Open XML security (OpenOffice.org and MS Office 2007)
OpenDocument and Open XML are both new open file formats for office documents. OpenDocument is an ISO standard, promoted by OpenOffice.org and Sun StarOffice. Open XML is the new f...
Philippe Lagadec
IS
2007
13 years 11 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini
ISSA
2008
14 years 26 days ago
Emerging Framework for The Evaluation of Open Source Security Tools
The drive from the South African Government towards the adoption of open source software across all platforms, incurred a number of research and development questions. The open so...
Elmarie Biermann, Jan Mentz
NOMS
2000
IEEE
14 years 3 months ago
Threat analysis and security architecture of mobile agent based management systems
Security issues are very important for the acceptance of mobile agent technology in management. We present a threat analysis and security architecture for these problems.
Helmut Reiser, Gerald Vogt
MA
2001
Springer
98views Communications» more  MA 2001»
14 years 3 months ago
A Scalable and Secure Global Tracking Service for Mobile Agents
In this paper, we propose a global tracking service for mobile agents, which is scalable to the Internet and accounts for security issues as well as the particularities of mobile a...
Volker Roth, Jan Peters
HICSS
2002
IEEE
152views Biometrics» more  HICSS 2002»
14 years 4 months ago
Security Considerations for Distributed Web-Based E-commerce Applications in Java
Today’s distributed e-commerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side processing and an ...
Timothy E. Lindquist
ICSNC
2006
IEEE
14 years 5 months ago
Security Issues in Wireless Sensor Networks
– Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive documen...
Tanveer Zia, Albert Y. Zomaya
ACSAC
2007
IEEE
14 years 5 months ago
Closed-Circuit Unobservable Voice over IP
Among all the security issues in Voice over IP (VoIP) communications, one of the most difficult to achieve is traffic analysis resistance. Indeed, classical approaches provide a...
Carlos Aguilar Melchor, Yves Deswarte, Julien Iguc...