Sciweavers

172 search results - page 10 / 35
» Secure and Manageable Virtual Private Networks for End-users
Sort
View
ECUMN
2007
Springer
14 years 1 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
CSREASAM
2004
13 years 8 months ago
A Unified Framework for Mobile Device Security
: Present-day handheld devices, such as PDAs, are a useful blend of hardware and software oriented toward the mobile workforce. While they provide the capability to review document...
Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev
OSDI
2006
ACM
14 years 7 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
ACNS
2004
Springer
90views Cryptology» more  ACNS 2004»
13 years 11 months ago
Centralized Management of Virtual Security Zones in IP Networks
Antti Peltonen, Teemupekka Virtanen, Esa Turtiaine...
SOUPS
2005
ACM
14 years 29 days ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko