Sciweavers

160 search results - page 24 / 32
» Key Attestation from Trusted Execution Environments
Sort
View
COMSIS
2004
110views more  COMSIS 2004»
13 years 8 months ago
Generating XML Based Specifications of Information Systems
This paper outlines a methodology for designing information systems based on XML. The methodology uses XML DTDs to define the design standards, and the structure and constraints of...
Miro Govedarica, Ivan Lukovic, Pavle Mogin
CAISE
2003
Springer
14 years 1 months ago
Real-time Data Warehousing with Temporal Requirements
Abstract. Flexibility to react on rapidly changing general conditions of the environment has become a key factor for economic success of any company. The competitiveness of an ente...
Francisco Araque
WSC
1996
13 years 9 months ago
A Parallel GPSS Based on the ParaSol Simulation System
Much of the research in parallel discrete-event simulation (PDES) has resulted in new experimental simulation languages or toolkits. Meanwhile, the simulation community continues ...
Felipe Knop, Edward Mascarenhas, Vernon Rego
CSFW
2002
IEEE
14 years 1 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
SACMAT
2009
ACM
14 years 3 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode