Sciweavers

5476 search results - page 134 / 1096
» Resettably Secure Computation
Sort
View
GI
2005
Springer
15 years 10 months ago
On the Coverage of Proactive Security: An Addition to the Taxonomy of Faults
: Intrusion tolerance is a recent approach to deal with intentional and malicious failures. It combines the research on fault tolerance with the research on security, and relies on...
Timo Warns
COMPUTER
2006
61views more  COMPUTER 2006»
15 years 4 months ago
Designing an Integrated Architecture for Network Content Security Gateways
Ying-Dar Lin, Chih-Wei Jan, Po-Ching Lin, Yuan-Che...
FOSAD
2009
Springer
15 years 11 months ago
Logic in Access Control (Tutorial Notes)
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and t...
Martín Abadi
SASN
2004
ACM
15 years 9 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner
MIDDLEWARE
2004
Springer
15 years 9 months ago
GridBox: securing hosts from malicious and greedy applications
Security is an important concern in providing the infrastructure for the implementation of general purpose computational grids. However, most grid implementations focus their secu...
Evgueni Dodonov, Joelle Quaini Sousa, Hélio...