Sciweavers

5386 search results - page 76 / 1078
» Approaches to Multimedia and Security
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer
BIOSIG
2008
159views Biometrics» more  BIOSIG 2008»
13 years 11 months ago
TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management
: Federated Single-Sign-On using web browsers as User Agents becomes increasingly important. However, current proposals require substantial changes in the implementation of the Rel...
Bud P. Bruegger, Detlef Hühnlein, Jörg S...
DAGSTUHL
2001
13 years 11 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
ISI
2005
Springer
14 years 3 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
USS
2008
14 years 9 days ago
V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments
Cyber security experiments with potentially malicious software can possibly damage the testbed environment and "escape" into the Internet. Due to this security concern, ...
Weiqing Sun, Varun Katta, Kumar Krishna, R. Sekar