Sciweavers

5476 search results - page 144 / 1096
» Resettably Secure Computation
Sort
View
CIE
2006
Springer
15 years 4 months ago
From digital audiobook to secure digital multimedia-book
Lavinia Egidi, Marco Furini
IDTRUST
2010
ACM
15 years 11 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
IEEEARES
2006
IEEE
15 years 10 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 10 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel