Sciweavers

6555 search results - page 167 / 1311
» Secure attribute-based systems
Sort
View
COMCOM
2011
14 years 9 months ago
Securing the data path of next-generation router systems
Tilman Wolf, Russell Tessier, Gayatri Prabhu
82
Voted
JISE
2010
69views more  JISE 2010»
14 years 9 months ago
An Efficient Secure Deletion Scheme for Flash File Systems
Jaeheung Lee, Sangho Yi, Junyoung Heo, Hyungbae Pa...
93
Voted
TRETS
2010
62views more  TRETS 2010»
14 years 9 months ago
Security Primitives for Reconfigurable Hardware-Based Systems
Ted Huffmire, Timothy E. Levin, Thuy D. Nguyen, Cy...
EH
2002
IEEE
108views Hardware» more  EH 2002»
15 years 7 months ago
We Need Assurance
When will we be secure? Nobody knows for sure – but it cannot happen before commercial security products and services possess not only enough functionality to satisfy customersâ...
Brian D. Snow
CSFW
2006
IEEE
15 years 8 months ago
Securing Interaction between Threads and the Scheduler
The problem of information flow in multithreaded programs remains an important open challenge. Existing approaches to specifying and enforcing information-flow security often su...
Alejandro Russo, Andrei Sabelfeld