Sciweavers

1790 search results - page 268 / 358
» On Privacy Models for RFID
Sort
View
126
Voted
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 7 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 7 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
124
Voted
ACISP
1998
Springer
15 years 7 months ago
Meta Objects for Access Control: Role-Based Principals
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
Thomas Riechmann, Jürgen Kleinöder
128
Voted
AGENTS
1998
Springer
15 years 7 months ago
WebMate: A Personal Agent for Browsing and Searching
The World-Wide Web is developing very fast. Currently, nding useful information on the Web is a time consuming process. In this paper, we present WebMate, an agent that helps user...
Liren Chen, Katia P. Sycara
121
Voted
OOPSLA
1998
Springer
15 years 7 months ago
JRes: A Resource Accounting Interface for Java
With the spread of the Internet the computing model on server systems is undergoing several important changes. Recent research ideas concerning dynamic operating system extensibil...
Grzegorz Czajkowski, Thorsten von Eicken