• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 21,883
Next 10 →

Comprehensive Security Framework for Global Threads Analysis

by Jacques Saraydaryan, Fatiha Benali, Stéphane Ubéda
"... Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Beha ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
and Behavioral Analysis are becoming new solutions to normalize the IS information and counter these new threads. This paper presents a framework which details the principal and necessary steps for monitoring an IS. We present the architecture of the framework, i.e. an ontology of activities carried out within

SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments

by Hassan Takabi, James B. D. Joshi, Gail-joon Ahn
"... Abstract—Cloud computing has recently gained tremendous momentum but still is in its infancy. It has the potential for significant cost reduction and the increased operating efficiencies in computing. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force an ..."
Abstract - Cited by 18 (2 self) - Add to MetaCart
and we need to provide security mechanisms to ensure its secure adoption. In this paper, we propose a comprehensive security framework for cloud computing environments. We also discuss challenges, existing solutions, approaches, and future work needed to provide a trustworthy cloud computing environment

A comprehensive Security Framework for Distributed Systems of Resource-constrained Devices

by Sebastian Unger, Guido Moritz
"... Abstract—This paper describes or current work in progress as part of the WS4D.org initiative. We state, that existing security techniques such as (D)TLS can not form a comprehensive security framework for large-scale distributed systems of highly resource-constrained devices. Instead, we investigate ..."
Abstract - Add to MetaCart
Abstract—This paper describes or current work in progress as part of the WS4D.org initiative. We state, that existing security techniques such as (D)TLS can not form a comprehensive security framework for large-scale distributed systems of highly resource-constrained devices. Instead, we

Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi-Agent System Architecture

by Amir Mohamed Talib, Rodziah Atan, Rusli Abdullah, Masrah Azrifah, Azmi Murad , 2012
"... The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or Cloud Data Storages (CDSs) housed in many different loca-tions and interconnected by high speed networks. CDS, like any other ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facili-tate confidentiality, correctness assurance, availability and integrity of users ’ data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS

Securing ad hoc networks

by Lidong Zhou, Zygmunt J. Haas
"... Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operation ..."
Abstract - Cited by 1064 (15 self) - Add to MetaCart
nodes — to defend routing against denial of service attacks. We also use replication and new cryptographic schemes, such as threshold cryptography, to build a highly secure and highly available key management service, which forms the core of our security framework.

Universally composable security: A new paradigm for cryptographic protocols

by Ran Canetti , 2013
"... We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved ..."
Abstract - Cited by 833 (37 self) - Add to MetaCart
We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols

Decentralized Trust Management

by Matt Blaze, Joan Feigenbaum, Jack Lacy - In Proceedings of the 1996 IEEE Symposium on Security and Privacy , 1996
"... We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, an ..."
Abstract - Cited by 1025 (24 self) - Add to MetaCart
, and deferring trust to third parties. Existing systems that support security in networked applications, including X.509 and PGP, address only narrow subsets of the overall trust management problem and often do so in a manner that is appropriate to only one application. This paper presents a comprehensive

Lattice-Based Access Control Models

by Ravi S. Sandhu , 1993
"... The objective of this article is to give a tutorial on lattice-based access control models for computer security. The paper begins with a review of Denning's axioms for information flow policies, which provide a theoretical foundation for these models. The structure of security labels in the ..."
Abstract - Cited by 1518 (61 self) - Add to MetaCart
The objective of this article is to give a tutorial on lattice-based access control models for computer security. The paper begins with a review of Denning's axioms for information flow policies, which provide a theoretical foundation for these models. The structure of security labels

Conversation as Experiential Learning

by Ann C. Baker, Patricia J. Jensen, David A. Kolb , 2005
"... This article proposes a framework relevant to the continuous learning of individuals and organizations. Drawing from the theory of experiential learning, the article proposes conversational learning as the experiential learning process occurring in conversation as learners construct meaning from t ..."
Abstract - Cited by 588 (9 self) - Add to MetaCart
their experiences. A theoretical framework based on five process dialectics is proposed here as the foundational under-pinning of conversational learning. The five dialectics—apprehension and comprehension; reflection and action; epistemological discourse and ontological recourse; individuality and relationality

Establishing Pairwise Keys in Distributed Sensor Networks

by Donggang Liu, Peng Ning , 2003
"... Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints on sensors, it is infeasible to use traditional key management techniques such as ..."
Abstract - Cited by 543 (29 self) - Add to MetaCart
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints on sensors, it is infeasible to use traditional key management techniques
Next 10 →
Results 1 - 10 of 21,883
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University