Sciweavers

1116 search results - page 126 / 224
» Secure Mediation: Requirements and Design
Sort
View
PPL
2008
117views more  PPL 2008»
13 years 9 months ago
Operating Systems in silicon and the Dynamic Management of Resources in Many-Core Chips
This discussion paper explores the problems of operating systems support when implementing concurrency controls at the level of the instruction set in processors designed for mult...
Chris R. Jesshope
ASIACRYPT
2010
Springer
13 years 7 months ago
Optimistic Concurrent Zero Knowledge
We design cryptographic protocols that recognize best case (optimistic) situations and exploit them. As a case study, we present a new concurrent zeroknowledge protocol that is exp...
Alon Rosen, Abhi Shelat
FC
2000
Springer
106views Cryptology» more  FC 2000»
14 years 28 days ago
Capability-Based Financial Instruments
Every novel cooperative arrangement of mutually suspicious parties interacting electronically -- every smart contract -- effectively requires a new cryptographic protocol. However,...
Mark S. Miller, Chip Morningstar, Bill Frantz
ACSAC
2007
IEEE
14 years 3 months ago
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control
Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a...
Enriquillo Valdez, Reiner Sailer, Ronald Perez
CCS
2005
ACM
14 years 2 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough