Results 1 - 10
of
21,883
Comprehensive Security Framework for Global Threads Analysis
"... Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Beha ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
and Behavioral Analysis are becoming new solutions to normalize the IS information and counter these new threads. This paper presents a framework which details the principal and necessary steps for monitoring an IS. We present the architecture of the framework, i.e. an ontology of activities carried out within
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments
"... Abstract—Cloud computing has recently gained tremendous momentum but still is in its infancy. It has the potential for significant cost reduction and the increased operating efficiencies in computing. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force an ..."
Abstract
-
Cited by 18 (2 self)
- Add to MetaCart
and we need to provide security mechanisms to ensure its secure adoption. In this paper, we propose a comprehensive security framework for cloud computing environments. We also discuss challenges, existing solutions, approaches, and future work needed to provide a trustworthy cloud computing environment
A comprehensive Security Framework for Distributed Systems of Resource-constrained Devices
"... Abstract—This paper describes or current work in progress as part of the WS4D.org initiative. We state, that existing security techniques such as (D)TLS can not form a comprehensive security framework for large-scale distributed systems of highly resource-constrained devices. Instead, we investigate ..."
Abstract
- Add to MetaCart
Abstract—This paper describes or current work in progress as part of the WS4D.org initiative. We state, that existing security techniques such as (D)TLS can not form a comprehensive security framework for large-scale distributed systems of highly resource-constrained devices. Instead, we
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi-Agent System Architecture
, 2012
"... The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or Cloud Data Storages (CDSs) housed in many different loca-tions and interconnected by high speed networks. CDS, like any other ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facili-tate confidentiality, correctness assurance, availability and integrity of users ’ data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS
Securing ad hoc networks
"... Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operation ..."
Abstract
-
Cited by 1064 (15 self)
- Add to MetaCart
nodes — to defend routing against denial of service attacks. We also use replication and new cryptographic schemes, such as threshold cryptography, to build a highly secure and highly available key management service, which forms the core of our security framework.
Universally composable security: A new paradigm for cryptographic protocols
, 2013
"... We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved ..."
Abstract
-
Cited by 833 (37 self)
- Add to MetaCart
We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols
Decentralized Trust Management
- In Proceedings of the 1996 IEEE Symposium on Security and Privacy
, 1996
"... We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, an ..."
Abstract
-
Cited by 1025 (24 self)
- Add to MetaCart
, and deferring trust to third parties. Existing systems that support security in networked applications, including X.509 and PGP, address only narrow subsets of the overall trust management problem and often do so in a manner that is appropriate to only one application. This paper presents a comprehensive
Lattice-Based Access Control Models
, 1993
"... The objective of this article is to give a tutorial on lattice-based access control models for computer security. The paper begins with a review of Denning's axioms for information flow policies, which provide a theoretical foundation for these models. The structure of security labels in the ..."
Abstract
-
Cited by 1518 (61 self)
- Add to MetaCart
The objective of this article is to give a tutorial on lattice-based access control models for computer security. The paper begins with a review of Denning's axioms for information flow policies, which provide a theoretical foundation for these models. The structure of security labels
Conversation as Experiential Learning
, 2005
"... This article proposes a framework relevant to the continuous learning of individuals and organizations. Drawing from the theory of experiential learning, the article proposes conversational learning as the experiential learning process occurring in conversation as learners construct meaning from t ..."
Abstract
-
Cited by 588 (9 self)
- Add to MetaCart
their experiences. A theoretical framework based on five process dialectics is proposed here as the foundational under-pinning of conversational learning. The five dialectics—apprehension and comprehension; reflection and action; epistemological discourse and ontological recourse; individuality and relationality
Establishing Pairwise Keys in Distributed Sensor Networks
, 2003
"... Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints on sensors, it is infeasible to use traditional key management techniques such as ..."
Abstract
-
Cited by 543 (29 self)
- Add to MetaCart
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints on sensors, it is infeasible to use traditional key management techniques
Results 1 - 10
of
21,883