Results 321 to 330 of about 8,750,178 (391)
Some of the next articles are maybe not open access.
Security by Insurance for Services
2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2016It is hard to guarantee proper protection in the Service Oriented Architecture (SOA), when a client outsources a part of its business or sends private data to a services provider. Various solutions proposed so far mostly require evidences of proper protection (e.g., source code for verification or execution traces for monitoring), which are to be ...
F Martinelli, A Yautsiukhin
openaire +4 more sources
Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns
IEEE Transactions on Services Computing, 2019Network functions virtualization intertwined with software-defined networking opens up great opportunities for flexible provisioning and composition of network functions, known as network service chaining.
Alireza Shameli-Sendi+3 more
semanticscholar +1 more source
Effect Sybil attack on security Authentication Service in VANET
2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2022VANETs are a kind of mobile ad hoc network (MANET) that provides a wide range of safety applications to vehicle passengers. VANETs are gaining popularity as a measure of the capacity to connect to a diverse set of unseen services. VANETs also enable road
Mustafa Maad Hamdi+5 more
semanticscholar +1 more source
Cloud-Centric Collaborative Security Service Placement for Advanced Metering Infrastructures
IEEE Transactions on Smart Grid, 2019The extensive integration of smart meters to utility communication networks introduces numerous cyber security concerns. Such meters are the primary access points to a smart grid advanced metering infrastructure (AMI).
M. Hasan, H. Mouftah
semanticscholar +1 more source
2013
Internet is offering a variety of services, that are assembled to accomplish requests made by clients. While serving a request, security of the communications and of the data exchanged among services is crucial. Furthermore, communications occur along specific channels, and it is equally important to guarantee that the interactions between a client and
DEGANO, PIERPAOLO+2 more
openaire +4 more sources
Internet is offering a variety of services, that are assembled to accomplish requests made by clients. While serving a request, security of the communications and of the data exchanged among services is crucial. Furthermore, communications occur along specific channels, and it is equally important to guarantee that the interactions between a client and
DEGANO, PIERPAOLO+2 more
openaire +4 more sources
2014
Ah, security. You knew we’d get here eventually. Security is one of those areas in the architecture that can become wildly complex before you know it. People are counting on you to get it right, with no margin for error. Lawsuits happen and companies end up on the front page, or completely go under, when security is implemented poorly. You simply can’t
Brian Wortman, Jamie Kurtz
openaire +2 more sources
Ah, security. You knew we’d get here eventually. Security is one of those areas in the architecture that can become wildly complex before you know it. People are counting on you to get it right, with no margin for error. Lawsuits happen and companies end up on the front page, or completely go under, when security is implemented poorly. You simply can’t
Brian Wortman, Jamie Kurtz
openaire +2 more sources
A security monitoring service for NoCs
Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis, 2008As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. Networks-on-Chip (NoCs) have appeared as design strategy to cope with the rapid increase in complexity of Multiprocessor Systems-on-Chip (MPSoCs), but only recently research community have ...
L. FIORIN+2 more
openaire +2 more sources
On the Synthesis of Secure Services Composition
2014Web service composition is one of the main research challenges of the last decades. Several frameworks have been developed to compose services in order to meet requirements and constraints imposed by a service consumer. Hereafter, we survey research work on evaluation and automatic synthesis of service composition with a particular eye to security ...
Jose A Martìn+4 more
openaire +6 more sources
Information Management & Computer Security, 2014
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information ...
S. Bahl, O. Wali
semanticscholar +1 more source
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information ...
S. Bahl, O. Wali
semanticscholar +1 more source
Proceedings 21st International Conference on Distributed Computing Systems Workshops, 2002
Active spaces and smart rooms are quickly gaining popularity in both the research arena, and in commercial projects. Active spaces are physical spaces populated with massive numbers of specialized embedded computing devices that increase human productivity by enabling users to interact seamlessly with the surrounding environment.
Roy H. Campbell+2 more
openaire +2 more sources
Active spaces and smart rooms are quickly gaining popularity in both the research arena, and in commercial projects. Active spaces are physical spaces populated with massive numbers of specialized embedded computing devices that increase human productivity by enabling users to interact seamlessly with the surrounding environment.
Roy H. Campbell+2 more
openaire +2 more sources