Sciweavers

949 search results - page 49 / 190
» Design methods for security and trust
Sort
View
AICCSA
2007
IEEE
108views Hardware» more  AICCSA 2007»
14 years 3 months ago
On Secure Consensus Information Fusion over Sensor Networks
In this work we have examined the problem of consensus information fusion from a novel point of view, challenging the fundamental assumption of mutual trust among the fusion parti...
Mahdi Kefayati, Mohammad Sadegh Talebi, Hamid R. R...
TRUST
2010
Springer
14 years 2 months ago
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the devic...
Ernie Brickell, Jiangtao Li
HICSS
2007
IEEE
131views Biometrics» more  HICSS 2007»
14 years 3 months ago
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System
Online banking has become increasingly important to the profitability of financial institutions as well as adding convenience for their customers. As the number of customers using...
Kenneth S. Edge, Richard A. Raines, Michael R. Gri...
ACSAC
1996
IEEE
14 years 1 months ago
Formal Techniques for an ITSEC-E4 Secure Gateway
In this paper we describe the method used to develop a gateway capable of meeting the ITSEC E4 requirements. The security policy was formally modelled and proven consistent with t...
Pierre Bieber
CSFW
1992
IEEE
14 years 1 months ago
Attribute Support for Inter-Domain Use
Mary Ellen Zurko Laboratory for Computer Science Massachusetts Institute of Technology and Digital Equipment Corporation Littleton, MA, 01460 This paper describes the User Attribu...
Mary Ellen Zurko