Sciweavers

364 search results - page 43 / 73
» Privacy Requirements Implemented with a JavaCard
Sort
View
ACSAC
2000
IEEE
15 years 7 months ago
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip
The performance of RSA hardware is primarily determined by an efficient implementation of the long integer modular arithmetic and the ability to utilize the Chinese Remainder The...
Johann Großschädl
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 6 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
122
Voted
ACSAC
1998
IEEE
15 years 6 months ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
OOPSLA
1999
Springer
15 years 6 months ago
Reducing Transfer Delay Using Java Class File Splitting and Prefetching
The proliferation of the Internet is fueling the development of mobile computing environments in which mobile code is executed on remote sites. In such environments, the end user ...
Chandra Krintz, Brad Calder, Urs Hölzle
SP
1997
IEEE
163views Security Privacy» more  SP 1997»
15 years 6 months ago
Anonymous Connections and Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
Paul F. Syverson, David M. Goldschlag, Michael G. ...