Sciweavers

6555 search results - page 35 / 1311
» Secure attribute-based systems
Sort
View
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
14 years 3 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
IPPS
2005
IEEE
14 years 2 months ago
Speculative Security Checks in Sandboxing Systems
Sandboxing systems are extremely useful for secure execution of untrusted applications. Many of the sandboxing systems proposed so far provide security by intercepting system call...
Yoshihiro Oyama, Koichi Onoue, Akinori Yonezawa
SP
2002
IEEE
160views Security Privacy» more  SP 2002»
13 years 8 months ago
On the Composition of Secure Systems
When complex systems are constructed from simpler components it is important to know how properties of the components behave under composition. In this article, we present various...
Heiko Mantel
CCS
2006
ACM
14 years 14 days ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
HOST
2008
IEEE
14 years 3 months ago
Trustworthy System Security through 3-D Integrated Hardware
Ted Huffmire, Jonathan Valamehr, Timothy Sherwood,...