Sciweavers

70 search results - page 2 / 14
» SecGuard: Secure and Practical Integrity Protection Model fo...
Sort
View
106
Voted
FODO
1989
Springer
164views Algorithms» more  FODO 1989»
15 years 6 months ago
ITOSS: An Integrated Toolkit For Operating System Security
d Abstract) Michael Rabin Aiken Computation Laboratory Harvard University Cambridge, MA 02138 J. D. Tygar School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213...
Michael O. Rabin, J. D. Tygar
105
Voted
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 9 months ago
Integrity Protection for Revision Control
Abstract. Users of online-collaboration tools and network storage services place considerable trust in their providers. This paper presents a novel approach for protecting data int...
Christian Cachin, Martin Geisler
122
Voted
IDTRUST
2010
ACM
15 years 9 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
USENIX
2007
15 years 5 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
125
Voted
COMPSAC
1998
IEEE
15 years 7 months ago
Capability-Based Protection for Integral Object-Oriented Systems
Protection is an essential issue for the kind of heterogeneous distributed interoperable object environments, which Java and CORBA are a glimpse of. A uniform protection mechanism...
María Ángeles Díaz Fond&oacut...