Sciweavers

949 search results - page 44 / 190
» Design methods for security and trust
Sort
View
CCS
2007
ACM
14 years 3 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
ACSAC
1997
IEEE
14 years 1 months ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford
IPPS
2007
IEEE
14 years 3 months ago
Improving Secure Communication Policy Agreements by Building Coalitions
In collaborative applications, participants agree on certain level of secure communication based on communication policy specifications. Given secure communication policy speci...
Srilaxmi Malladi, Sushil K. Prasad, Shamkant B. Na...
DEPCOS
2008
IEEE
96views Hardware» more  DEPCOS 2008»
14 years 3 months ago
Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards Application
Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is sp...
Lukasz Cyra, Janusz Górski
WIMOB
2007
IEEE
14 years 3 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud