Sciweavers

2024 search results - page 30 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
ACSAC
1998
IEEE
15 years 8 months ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
ACSAC
2001
IEEE
15 years 8 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
15 years 10 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...
ICDE
2006
IEEE
161views Database» more  ICDE 2006»
15 years 10 months ago
Reputation Lending for Virtual Communities
Reputation management schemes have recently emerged as a mechanism for improving trust and security in peer-topeer networks. A new entrant in a network with reputation management ...
Anurag Garg, Alberto Montresor, Roberto Battiti
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 11 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...