Sciweavers

1134 search results - page 48 / 227
» Distributed Proving in Access-Control Systems
Sort
View
139
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo
127
Voted
SIGCOMM
2010
ACM
15 years 2 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
120
Voted
ICNP
2003
IEEE
15 years 8 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
121
Voted
IMCS
2007
77views more  IMCS 2007»
15 years 2 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
138
Voted
GLOBECOM
2008
IEEE
15 years 9 months ago
A Distributed Multi-User MIMO MAC Protocol for Wireless Local Area Networks
— Multi-user multiple-input multiple-output (MIMO) systems have been emerging and attracting considerable attention recently for its potential to substantially improve system cap...
Lin X. Cai, Hangguan Shan, Weihua Zhuang, Xuemin S...