Sciweavers

5665 search results - page 53 / 1133
» Introduction to Computer Security
Sort
View
ICICS
1997
Springer
14 years 1 months ago
An implementable scheme for secure delegation of computing and data
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, d...
Josep Domingo-Ferrer, Ricardo X. Sanchez del Casti...
ESORICS
1994
Springer
14 years 28 days ago
Liability and Computer Security: Nine Principles
The conventional wisdom is that security priorities should be set by risk analysis. However, reality is subtly different: many computer security systems are at least as much about ...
Ross J. Anderson

Book
273views
15 years 7 months ago
Designing and Building Parallel Program
"Designing and Building Parallel Programs is a book for students and professionals who need to know how to write parallel programs. It is neither a programming language manual...
Ian Foster
CCS
2004
ACM
14 years 2 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers