Sciweavers

5123 search results - page 7 / 1025
» Performance and Security Tradeoff
Sort
View
SP
2000
IEEE
14 years 13 hour ago
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspec...
John A. Clark, Jeremy L. Jacob
INTERACT
2007
13 years 10 months ago
Designing a Trade-Off Between Usability and Security: A Metrics Based-Model
The design of usable yet secure systems raises crucial questions when it comes to balancing properly security and usability. Finding the right tradeoff between these two quality at...
Christina Braz, Ahmed Seffah, David M'Raïhi
STORAGESS
2005
ACM
14 years 2 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
14 years 1 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao
SSR
2001
104views more  SSR 2001»
13 years 9 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...