Results 291 to 300 of about 6,779,765 (359)
Some of the next articles are maybe not open access.
Effect Sybil attack on security Authentication Service in VANET
2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2022VANETs are a kind of mobile ad hoc network (MANET) that provides a wide range of safety applications to vehicle passengers. VANETs are gaining popularity as a measure of the capacity to connect to a diverse set of unseen services. VANETs also enable road
Mustafa Maad Hamdi+5 more
semanticscholar +1 more source
Cloud-Centric Collaborative Security Service Placement for Advanced Metering Infrastructures
IEEE Transactions on Smart Grid, 2019The extensive integration of smart meters to utility communication networks introduces numerous cyber security concerns. Such meters are the primary access points to a smart grid advanced metering infrastructure (AMI).
M. Hasan, H. Mouftah
semanticscholar +1 more source
2013
Internet is offering a variety of services, that are assembled to accomplish requests made by clients. While serving a request, security of the communications and of the data exchanged among services is crucial. Furthermore, communications occur along specific channels, and it is equally important to guarantee that the interactions between a client and
DEGANO, PIERPAOLO+2 more
openaire +4 more sources
Internet is offering a variety of services, that are assembled to accomplish requests made by clients. While serving a request, security of the communications and of the data exchanged among services is crucial. Furthermore, communications occur along specific channels, and it is equally important to guarantee that the interactions between a client and
DEGANO, PIERPAOLO+2 more
openaire +4 more sources
Security and Privacy on 6G Network Edge: A Survey
IEEE Communications Surveys and Tutorials, 2023To meet the stringent service requirements of 6G applications such as immersive cloud eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that an increasing number of servers will be deployed on the network edge.
Bomin Mao, Jiajia Liu, Y. Wu, Nei Kato
semanticscholar +1 more source
2014
Ah, security. You knew we’d get here eventually. Security is one of those areas in the architecture that can become wildly complex before you know it. People are counting on you to get it right, with no margin for error. Lawsuits happen and companies end up on the front page, or completely go under, when security is implemented poorly. You simply can’t
Brian Wortman, Jamie Kurtz
openaire +2 more sources
Ah, security. You knew we’d get here eventually. Security is one of those areas in the architecture that can become wildly complex before you know it. People are counting on you to get it right, with no margin for error. Lawsuits happen and companies end up on the front page, or completely go under, when security is implemented poorly. You simply can’t
Brian Wortman, Jamie Kurtz
openaire +2 more sources
A security monitoring service for NoCs
Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis, 2008As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. Networks-on-Chip (NoCs) have appeared as design strategy to cope with the rapid increase in complexity of Multiprocessor Systems-on-Chip (MPSoCs), but only recently research community have ...
L. FIORIN+2 more
openaire +2 more sources
Information Management & Computer Security, 2014
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information ...
S. Bahl, O. Wali
semanticscholar +1 more source
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information ...
S. Bahl, O. Wali
semanticscholar +1 more source
On the Synthesis of Secure Services Composition
2014Web service composition is one of the main research challenges of the last decades. Several frameworks have been developed to compose services in order to meet requirements and constraints imposed by a service consumer. Hereafter, we survey research work on evaluation and automatic synthesis of service composition with a particular eye to security ...
Jose A Martìn+4 more
openaire +6 more sources
Proceedings 21st International Conference on Distributed Computing Systems Workshops, 2002
Active spaces and smart rooms are quickly gaining popularity in both the research arena, and in commercial projects. Active spaces are physical spaces populated with massive numbers of specialized embedded computing devices that increase human productivity by enabling users to interact seamlessly with the surrounding environment.
Roy H. Campbell+2 more
openaire +2 more sources
Active spaces and smart rooms are quickly gaining popularity in both the research arena, and in commercial projects. Active spaces are physical spaces populated with massive numbers of specialized embedded computing devices that increase human productivity by enabling users to interact seamlessly with the surrounding environment.
Roy H. Campbell+2 more
openaire +2 more sources
2006 International Conference on Dependability of Computer Systems, 2006
Security issues within Web services, and problems of data confidentiality and integrity in particular, are discussed. A joint security model integrating three main technologies (SOAP, UDDI and WSDL) is defined. Suitable security mechanisms and solutions are also described.
Henryk Krawczyk, M. Wielgus
openaire +2 more sources
Security issues within Web services, and problems of data confidentiality and integrity in particular, are discussed. A joint security model integrating three main technologies (SOAP, UDDI and WSDL) is defined. Suitable security mechanisms and solutions are also described.
Henryk Krawczyk, M. Wielgus
openaire +2 more sources