Results 291 to 300 of about 6,779,765 (359)
Some of the next articles are maybe not open access.

Effect Sybil attack on security Authentication Service in VANET

2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2022
VANETs are a kind of mobile ad hoc network (MANET) that provides a wide range of safety applications to vehicle passengers. VANETs are gaining popularity as a measure of the capacity to connect to a diverse set of unseen services. VANETs also enable road
Mustafa Maad Hamdi   +5 more
semanticscholar   +1 more source

Cloud-Centric Collaborative Security Service Placement for Advanced Metering Infrastructures

IEEE Transactions on Smart Grid, 2019
The extensive integration of smart meters to utility communication networks introduces numerous cyber security concerns. Such meters are the primary access points to a smart grid advanced metering infrastructure (AMI).
M. Hasan, H. Mouftah
semanticscholar   +1 more source

Secure and Unfailing Services

2013
Internet is offering a variety of services, that are assembled to accomplish requests made by clients. While serving a request, security of the communications and of the data exchanged among services is crucial. Furthermore, communications occur along specific channels, and it is equally important to guarantee that the interactions between a client and
DEGANO, PIERPAOLO   +2 more
openaire   +4 more sources

Security and Privacy on 6G Network Edge: A Survey

IEEE Communications Surveys and Tutorials, 2023
To meet the stringent service requirements of 6G applications such as immersive cloud eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that an increasing number of servers will be deployed on the network edge.
Bomin Mao, Jiajia Liu, Y. Wu, Nei Kato
semanticscholar   +1 more source

Securing the Service

2014
Ah, security. You knew we’d get here eventually. Security is one of those areas in the architecture that can become wildly complex before you know it. People are counting on you to get it right, with no margin for error. Lawsuits happen and companies end up on the front page, or completely go under, when security is implemented poorly. You simply can’t
Brian Wortman, Jamie Kurtz
openaire   +2 more sources

A security monitoring service for NoCs

Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis, 2008
As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. Networks-on-Chip (NoCs) have appeared as design strategy to cope with the rapid increase in complexity of Multiprocessor Systems-on-Chip (MPSoCs), but only recently research community have ...
L. FIORIN   +2 more
openaire   +2 more sources

Perceived significance of information security governance to predict the information security service quality in software service industry: An empirical analysis

Information Management & Computer Security, 2014
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information ...
S. Bahl, O. Wali
semanticscholar   +1 more source

On the Synthesis of Secure Services Composition

2014
Web service composition is one of the main research challenges of the last decades. Several frameworks have been developed to compose services in order to meet requirements and constraints imposed by a service consumer. Hereafter, we survey research work on evaluation and automatic synthesis of service composition with a particular eye to security ...
Jose A Martìn   +4 more
openaire   +6 more sources

Wearable security services

Proceedings 21st International Conference on Distributed Computing Systems Workshops, 2002
Active spaces and smart rooms are quickly gaining popularity in both the research arena, and in commercial projects. Active spaces are physical spaces populated with massive numbers of specialized embedded computing devices that increase human productivity by enabling users to interact seamlessly with the surrounding environment.
Roy H. Campbell   +2 more
openaire   +2 more sources

Security of Web Services

2006 International Conference on Dependability of Computer Systems, 2006
Security issues within Web services, and problems of data confidentiality and integrity in particular, are discussed. A joint security model integrating three main technologies (SOAP, UDDI and WSDL) is defined. Suitable security mechanisms and solutions are also described.
Henryk Krawczyk, M. Wielgus
openaire   +2 more sources

Home - About - Disclaimer - Privacy