Sciweavers

6555 search results - page 108 / 1311
» Secure attribute-based systems
Sort
View
SISW
2003
IEEE
14 years 2 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
ACMICEC
2003
ACM
113views ECommerce» more  ACMICEC 2003»
14 years 2 months ago
PayCash: a secure efficient Internet payment system
This paper describes PayCash, an Internet payment system that was designed to offer strong security and privacy protection. This system is based on the concept of electronic cash,...
Jon M. Peha, Ildar M. Khamitov
WCRE
1999
IEEE
14 years 1 months ago
A Tool for Securely Integrating Legacy Systems into a Distributed Environment
Legacy systems provide services that remain useful beyond the means of the technology in which they were originally implemented. Our Legacy Wrapper tool packages the services of a...
Timothy S. Souder, Spiros Mancoridis
ESORICS
1994
Springer
14 years 1 months ago
The ESPRIT Project CAFE - High Security Digital Payment Systems
CAFE ("Conditional Access for Europe") is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for condit...
Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, ...
USENIX
1990
13 years 10 months ago
The COPS Security Checker System
In the past several years, there have been a large number of published works that have graphically described a wide variety of security problems particular to Unix. Without fail, ...
Daniel Farmer, Eugene H. Spafford