Sciweavers

548 search results - page 76 / 110
» An authorization and access control scheme for pervasive com...
Sort
View
SOSP
2003
ACM
14 years 6 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
PDCN
2004
13 years 10 months ago
Implementing a secure setuid program
Setuid programs are often exploited by malicious attackers to obtain unauthorized access to local systems. Setuid programs, especially owned by the root user, are granted root pri...
Takahiro Shinagawa, Kenji Kono
CCS
2007
ACM
14 years 3 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
CARDIS
2008
Springer
153views Hardware» more  CARDIS 2008»
13 years 11 months ago
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents
In recent years more and more security sensitive applications use passive smart devices such as contactless smart cards and RFID tags. Cost constraints imply a small hardware footp...
Carsten Rolfes, Axel Poschmann, Gregor Leander, Ch...
WISEC
2009
ACM
14 years 3 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz