Sciweavers

3712 search results - page 581 / 743
» Role-Based Access Control
Sort
View
HIPEAC
2005
Springer
15 years 8 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
107
Voted
ICN
2005
Springer
15 years 8 months ago
Securing Layer 2 in Local Area Networks
Abstract. Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data Link Layer (Layer 2) security has not bee...
Hayriye Altunbasak, Sven Krasser, Henry L. Owen, J...
ICN
2005
Springer
15 years 8 months ago
MiSC: A New Availability Remote Storage System for Mobile Appliance
Abstract. The continued growth of both mobile appliances and wireless Internet technologies is bringing a new telecommunication revolution and has extended the demand of various se...
Joo-Ho Kim, Bo-Seok Moon, Myong-Soon Park
ICTAC
2005
Springer
15 years 8 months ago
Toward an Abstract Computer Virology
n abstract computer virology G. Bonfante, M. Kaczmarek, and J-Y Marion Loria, Calligramme project, B.P. 239, 54506 Vandœuvre-l`es-Nancy C´edex, France, and ´Ecole Nationale Sup...
Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves ...
ISW
2005
Springer
15 years 8 months ago
Device-Enabled Authorization in the Grey-System
d Abstract) Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, and Peter Rutenbar Carnegie Mellon University, Pittsburgh, Pennsylvania, USA We describe ...
Lujo Bauer, Scott Garriss, Jonathan M. McCune, Mic...