Sciweavers

3821 search results - page 105 / 765
» A Security Model for Aglets
Sort
View
CSFW
1998
IEEE
15 years 7 months ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe
117
Voted
DEXAW
1998
IEEE
122views Database» more  DEXAW 1998»
15 years 7 months ago
A Prototype Model for Data Warehouse Security Based on Metadata
The aim of this paper is to give an overview of security relevant aspects of existing OLAP/Data Warehouse solutions, an area which has seen rather little interest from product dev...
Nevana Katic, Gerald Quirchmayr, Josef Schiefer, M...
108
Voted
TRUST
2009
Springer
15 years 10 months ago
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels
Hans Löhr, Ahmad-Reza Sadeghi, Christian St&u...
110
Voted
ETFA
2008
IEEE
15 years 9 months ago
Functional safety and system security in automation systems - a life cycle model
Industrial and building automation systems are more and more important in industry and buildings. New services and novel fields of application call for dependable systems. Two ver...
Thomas Novak, Albert Treytl
218
Voted
VLDB
2007
ACM
155views Database» more  VLDB 2007»
16 years 3 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik