Sciweavers

1116 search results - page 163 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
SIGOPSE
2004
ACM
14 years 1 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase
HOTOS
2003
IEEE
14 years 1 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
DEXAW
2009
IEEE
102views Database» more  DEXAW 2009»
13 years 11 months ago
A Pattern for Secure Graphical User Interface Systems
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
AIL
2006
84views more  AIL 2006»
13 years 7 months ago
Meaningful electronic signatures based on an automatic indexing method
Legal information certification and secured storage combined with documents electronic signature are of great interest when digital documents security and conservation are in conce...
Maxime Wack, Ahmed Nait-Sidi-Moh, Sid Lamrous, Nat...
IJSN
2008
147views more  IJSN 2008»
13 years 7 months ago
Formal modelling and analysis of XML firewall for service-oriented systems
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy