Sciweavers

894 search results - page 60 / 179
» Secure Implementation of Channel Abstractions
Sort
View
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
14 years 4 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
MDA
1999
Springer
107views Communications» more  MDA 1999»
14 years 2 months ago
On Simulation Modeling of Information Dissemination Systems in Mobile Environments
Abstract. In this paper, we propose dynamic discrete-event based models for information dissemination systems in both single cell and multiple cell mobile environments. We demonstr...
Wang-Chien Lee, Johnson Lee, Karen E. Huff
ACSAC
1998
IEEE
14 years 2 months ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
POLICY
2009
Springer
14 years 4 months ago
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
Yuu-Heng Cheng, Mariana Raykova, Alexander Poylish...
EDBT
2004
ACM
108views Database» more  EDBT 2004»
14 years 10 months ago
A Framework for Efficient Storage Security in RDBMS
Abstract. With the widespread use of e-business coupled with the public's awareness of data privacy issues and recent database security related legislations, incorporating sec...
Balakrishna R. Iyer, Sharad Mehrotra, Einar Myklet...