Sciweavers

650 search results - page 33 / 130
» Privacy in Non-private Environments
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell
SPW
2005
Springer
14 years 3 months ago
Implementing a Multi-hat PDA
We describe our work in progress aimed at implementing a multi-hat PDA. Our current prototype is based on SELinux and KDE and accepts a proximity token, in the form of a Bluetooth ...
Matthew Johnson
ACSAC
2003
IEEE
14 years 3 months ago
Goalkeeper: Close-In Interface Protection
This paper discusses a potential security issue in common operating system and application environments regarding dynamically attached devices and device interfaces. A set of coun...
Stephen D. Wolthusen
OOPSLA
1991
Springer
14 years 1 months ago
Developing a GUIDE Using Object-Oriented Programming
PICASSOis a graphical user interface development environment built using the Common Lisp Object System (CLOS). This paper describes how CLOS features including multiple inheritanc...
Joseph A. Konstan, Lawrence A. Rowe
ESORICS
2008
Springer
13 years 11 months ago
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs
Key agreement is a fundamental security functionality by which pairs of nodes agree on shared keys to be used for protecting their pairwise communications. In this work we study k...
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal R...