Sciweavers

1801 search results - page 114 / 361
» Implementation-Oriented Secure Architectures
Sort
View
ACSAC
1999
IEEE
14 years 14 days ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
ICNP
2007
IEEE
14 years 2 months ago
Source Address Validation: Architecture and Protocol Design
The current Internet addressing architecture does not verify the source address of a packet received and forwarded. This causes serious security and accounting problems. Based on t...
Jianping Wu, Gang Ren, Xing Li
ICSE
1993
IEEE-ACM
14 years 7 days ago
Formal Approaches to Software Architecture
Over the past 15 years there has been increasing recognition that careful attention to the design of a system’s software architecture is critical to satisfying its requirements ...
David Garlan
SAINT
2006
IEEE
14 years 2 months ago
A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems
Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. So far most of t...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
IDMS
2001
Springer
133views Multimedia» more  IDMS 2001»
14 years 18 days ago
An Access Control Architecture for Metropolitan Area Wireless Networks
This paper introduces a novel access control architecture for publicly accessible, wireless networks. The architecture was designed to address the requirements obtained from a case...
Stefan Schmid, Joe Finney, Maomao Wu, Adrian Frida...