Results 321 to 330 of about 8,750,178 (391)
Some of the next articles are maybe not open access.

Security by Insurance for Services

2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2016
It is hard to guarantee proper protection in the Service Oriented Architecture (SOA), when a client outsources a part of its business or sends private data to a services provider. Various solutions proposed so far mostly require evidences of proper protection (e.g., source code for verification or execution traces for monitoring), which are to be ...
F Martinelli, A Yautsiukhin
openaire   +4 more sources

Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns

IEEE Transactions on Services Computing, 2019
Network functions virtualization intertwined with software-defined networking opens up great opportunities for flexible provisioning and composition of network functions, known as network service chaining.
Alireza Shameli-Sendi   +3 more
semanticscholar   +1 more source

Effect Sybil attack on security Authentication Service in VANET

2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2022
VANETs are a kind of mobile ad hoc network (MANET) that provides a wide range of safety applications to vehicle passengers. VANETs are gaining popularity as a measure of the capacity to connect to a diverse set of unseen services. VANETs also enable road
Mustafa Maad Hamdi   +5 more
semanticscholar   +1 more source

Cloud-Centric Collaborative Security Service Placement for Advanced Metering Infrastructures

IEEE Transactions on Smart Grid, 2019
The extensive integration of smart meters to utility communication networks introduces numerous cyber security concerns. Such meters are the primary access points to a smart grid advanced metering infrastructure (AMI).
M. Hasan, H. Mouftah
semanticscholar   +1 more source

Secure and Unfailing Services

2013
Internet is offering a variety of services, that are assembled to accomplish requests made by clients. While serving a request, security of the communications and of the data exchanged among services is crucial. Furthermore, communications occur along specific channels, and it is equally important to guarantee that the interactions between a client and
DEGANO, PIERPAOLO   +2 more
openaire   +4 more sources

Securing the Service

2014
Ah, security. You knew we’d get here eventually. Security is one of those areas in the architecture that can become wildly complex before you know it. People are counting on you to get it right, with no margin for error. Lawsuits happen and companies end up on the front page, or completely go under, when security is implemented poorly. You simply can’t
Brian Wortman, Jamie Kurtz
openaire   +2 more sources

A security monitoring service for NoCs

Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis, 2008
As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. Networks-on-Chip (NoCs) have appeared as design strategy to cope with the rapid increase in complexity of Multiprocessor Systems-on-Chip (MPSoCs), but only recently research community have ...
L. FIORIN   +2 more
openaire   +2 more sources

On the Synthesis of Secure Services Composition

2014
Web service composition is one of the main research challenges of the last decades. Several frameworks have been developed to compose services in order to meet requirements and constraints imposed by a service consumer. Hereafter, we survey research work on evaluation and automatic synthesis of service composition with a particular eye to security ...
Jose A Martìn   +4 more
openaire   +6 more sources

Perceived significance of information security governance to predict the information security service quality in software service industry: An empirical analysis

Information Management & Computer Security, 2014
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information ...
S. Bahl, O. Wali
semanticscholar   +1 more source

Wearable security services

Proceedings 21st International Conference on Distributed Computing Systems Workshops, 2002
Active spaces and smart rooms are quickly gaining popularity in both the research arena, and in commercial projects. Active spaces are physical spaces populated with massive numbers of specialized embedded computing devices that increase human productivity by enabling users to interact seamlessly with the surrounding environment.
Roy H. Campbell   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy