Sciweavers

CSREASAM
2006
14 years 27 days ago
Secure E-commerce Protection Profile
We present a Secure E-commerce Protection Profile (SEPP) that captures security requirements for securing sessions in the e-commerce operational environment. The SEPP is prepared ...
Anil Kumar Venkataiahgari, Mourad Debbabi, J. Will...
CSREASAM
2006
14 years 27 days ago
Design and Implementation of a High-Performance Active Network Security System
This paper describes the design, implementation and performance of a high-performance security system - Active Network Security Immune System (ANSIS)
Wen Ouyang, Kun-Ming Yu, Wen-Ping Lee
CSREASAM
2006
14 years 27 days ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
CSREASAM
2006
14 years 27 days ago
Modelling to Enhance GSM Network Security
With the rapid development in global communication networks, the threat of security and in particular that of cellular telecommunication system is real and highly dangerous. Mobil...
Johnnes Arreymbi
AISM
2004
14 years 27 days ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...
ACSW
2004
14 years 27 days ago
A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios
This paper examines the security aspects of different pervasive scenarios involving agent communities evolved using multi agent systems (MAS). It describes the motivation and the ...
John Page, Arkady B. Zaslavsky, Maria Indrawan
RECOSOC
2007
115views Hardware» more  RECOSOC 2007»
14 years 28 days ago
Self-adaptive Security at Application Level: a Proposal
—Self-adaptive systems have the ability to adapt themselves to mutating external or internal conditions without requesting any intervention of the user; the security of such syst...
Alberto Ferrante, Antonio Vincenzo Taddeo, Mariagi...
MOBIMEDIA
2007
14 years 28 days ago
AAA and mobile networks: security aspects and architectural efficiency
Security is a crucial factor in the provision of the network services, in both wireless and wired communications. Day by day, the number of subscribers is increased by an exponent...
Nicolas Sklavos, Spyros G. Denazis, Odysseas G. Ko...
IM
2007
14 years 28 days ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
MEDIAFORENSICS
2010
14 years 29 days ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine