Sciweavers

615 search results - page 34 / 123
» Frameworks for Securing Limited-Device Applications
Sort
View
CSFW
2004
IEEE
14 years 12 days ago
Modelling Downgrading in Information Flow Security
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
COMSWARE
2008
IEEE
14 years 3 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
CSREASAM
2006
13 years 10 months ago
Case Study: An Implementation of a Secure Steganographic System
- In this paper, we present the development of a Windows-based application implemented on the Microsoft .NET platform as a framework to allow a user to first compress and encrypt a...
Xuan-Hien Dang, Krishna C. S. Kota
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 8 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang