Sciweavers

1801 search results - page 95 / 361
» Implementation-Oriented Secure Architectures
Sort
View
ISI
2008
Springer
13 years 8 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
PLDI
2006
ACM
14 years 2 months ago
A microkernel virtual machine: : building security with clear interfaces
In this paper we propose a novel microkernel-based virtual machine (µKVM), a new code-based security framework with a simple and declarative security architecture. The main desig...
Xiaoqi Lu, Scott F. Smith
CCS
2006
ACM
13 years 12 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
GRID
2005
Springer
14 years 1 months ago
Bridging organizational network boundaries on the grid
— The Grid offers significant opportunities for performing wide area distributed computing, allowing multiple organizations to collaborate and build dynamic and flexible virtual ...
Jefferson Tan, David Abramson, Colin Enticott
DISCEX
2003
IEEE
14 years 1 months ago
MYSEA Technology Demonstration
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanis...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...