Sciweavers

2057 search results - page 95 / 412
» Distributed Secure Systems: Then and Now
Sort
View
ICIP
2010
IEEE
15 years 2 months ago
A hybrid fusion method of fingerprint identification for high security applications
Though fingerprint identification is widely used now, its imperfect performance for some high security applications, such as ATM, the access control of nuclear power stations and ...
Yilong Yin, Yanbin Ning, Zhiguo Yang
JNW
2007
135views more  JNW 2007»
15 years 4 months ago
Access Control in Decentralised Publish/Subscribe Systems
Abstract— Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
JSS
2007
67views more  JSS 2007»
15 years 4 months ago
Worm-IT - A wormhole-based intrusion-tolerant group communication system
This paper presents Worm-IT, a new intrusion-tolerant group communication system with a membership service and a view-synchronous atomic multicast primitive. The system is intrusi...
Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lun...
HOTOS
1997
IEEE
15 years 8 months ago
Security for Extensible Systems
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on...
Robert Grimm, Brian N. Bershad
SIGSOFT
2002
ACM
16 years 4 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...