Sciweavers

52 search results - page 6 / 11
» Improving the Security of Mobile-Phone Access to Remote Pers...
Sort
View
MOBISYS
2008
ACM
14 years 7 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...
CCGRID
2004
IEEE
13 years 11 months ago
A hardware-secured credential repository for Grid PKIs
Public Key Infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositorie...
Markus Lorch, Jim Basney, Dennis G. Kafura
SOSP
2003
ACM
14 years 4 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
IEEEARES
2007
IEEE
14 years 1 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov