Sciweavers

6555 search results - page 135 / 1311
» Secure attribute-based systems
Sort
View
167
Voted
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 6 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
15 years 8 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speciï¬...
Anooshiravan Saboori, Christoforos N. Hadjicostis
161
Voted
WIS
2004
15 years 3 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
IEICET
2008
124views more  IEICET 2008»
15 years 2 months ago
A Secure Content Delivery System Based on a Partially Reconfigurable FPGA
We developed a content delivery system using a partially reconfigurable FPGA to securely distribute digital content on the Internet. With partial reconfigurability of a Xilinx Vir...
Yohei Hori, Hiroyuki Yokoyama, Hirofumi Sakane, Ke...
135
Voted
IJWIS
2007
153views more  IJWIS 2007»
15 years 2 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...