Sciweavers

1801 search results - page 73 / 361
» Memory-Centric Security Architecture
Sort
View
DAC
2007
ACM
15 years 8 months ago
Trusted Design in FPGAs
Using FPGAs, a designer can separate the design process from the manufacturing flow. Therefore, the owner of a sensitive design need not expose the design to possible theft and ta...
Steven Trimberger
CSE
2009
IEEE
15 years 8 months ago
Adapting Privacy-Preserving Computation to the Service Provider Model
There are many applications for Secure Multi-Party Computation (SMC), but practical adoption is still an issue. One reason is that the business model of the application does not m...
Florian Kerschbaum
ICCS
2005
Springer
15 years 10 months ago
Dynamic and Fine-Grained Authentication and Authorization Architecture for Grid Computing
The Globus Toolkit makes it very easy and comfortable for grid users to develop and deploy grid service. As for the security mechanism, however, only static authentication and coar...
Hyunjoon Jung, Hyuck Han, Hyungsoo Jung, Heon Youn...
ESCIENCE
2005
IEEE
15 years 10 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
ACSAC
2007
IEEE
15 years 11 months ago
An Overview of the Annex System
This paper describes the security and network architecture of the Annex system, a family of technologies for secure and pervasive communication and information processing that we ...
Duncan A. Grove, Toby C. Murray, C. A. Owen, Chris...