Sciweavers

6555 search results - page 184 / 1311
» Secure attribute-based systems
Sort
View
NBIS
2009
Springer
15 years 7 months ago
A Security Framework for JXTA-Overlay
At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
15 years 6 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
111
Voted
HOTOS
2009
IEEE
15 years 6 months ago
Security Impact Ratings Considered Harmful
In this paper, we question the common practice of assigning security impact ratings to OS updates. Specifically, we present evidence that ranking updates by their perceived securi...
Jeff Arnold, Tim Abbott, Waseem Daher, Gregory Pri...
CORR
2011
Springer
216views Education» more  CORR 2011»
14 years 9 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
100
Voted
ISPEC
2007
Springer
15 years 8 months ago
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems
Considerable research and experiment results in recent years have shown that the server-proxy-user architecture represents an efficient and scalable new paradigm for multimedia con...
Robert H. Deng, Yanjiang Yang