Sciweavers

5484 search results - page 122 / 1097
» Almost-Everywhere Secure Computation
Sort
View
124
Voted
PERCOM
2010
ACM
15 years 2 months ago
When Eco-IT meets security: Concealed network coding for multicast traffic
Alban Hessler, Takahiro Kakumaru, Dirk Westhoff
COMCOM
2011
14 years 11 months ago
Securing the data path of next-generation router systems
Tilman Wolf, Russell Tessier, Gayatri Prabhu
IDTRUST
2010
ACM
15 years 10 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
IEEEARES
2006
IEEE
15 years 10 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson
137
Voted
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 9 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel