Sciweavers

2187 search results - page 308 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
HICSS
2007
IEEE
88views Biometrics» more  HICSS 2007»
14 years 3 months ago
Promoting Digital Forensics Awareness through the University of Alaska Fairbanks ASSERT Center
As a Center of Academic Excellence (CAE) in Information Assurance Education, the University of Alaska Fairbanks is committed to promoting a culture of awareness and advancement of...
Kara L. Nance, Brian Hay, Christopher Hecker
SC
2005
ACM
14 years 2 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
ACSAC
1999
IEEE
14 years 1 months ago
Transactions in Java Card
A smart card runtime environment must provide the proper transaction support for the reliable update of data, especially on multiapplication cards like the Java Card. The transact...
Marcus Oestreicher
ESORICS
2008
Springer
13 years 11 months ago
Code-Carrying Authorization
In authorization, there is often a wish to shift the burden of proof to those making requests, since they may have more resources and more specific knowledge to construct the requi...
Sergio Maffeis, Martín Abadi, Cédric...
QEST
2006
IEEE
14 years 3 months ago
Continuous Bytecode Instruction Counting for CPU Consumption Estimation
As an execution platform, the Java Virtual Machine (JVM) provides many benefits in terms of portability and security. However, this advantage turns into an obstacle when it comes...
Andrea Camesi, Jarle Hulaas, Walter Binder