Sciweavers

6555 search results - page 40 / 1311
» Secure attribute-based systems
Sort
View
ESORICS
2002
Springer
14 years 8 months ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
14 years 2 months ago
e-Government and Cyber Security: The Role of Cyber Security Exercises
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce soluti...
Art Conklin, Gregory B. White
PST
2004
13 years 10 months ago
Secure Public Instant Messaging
We provide a survey on security features and threats to existing Instant Messaging (IM) networks and discuss how currently available systems fail to provide adequate security in l...
Mohammad Mannan, Paul C. van Oorschot
ISSE
2006
13 years 8 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy
HOTOS
2007
IEEE
14 years 19 days ago
End-to-End Web Application Security
Web applications are important, ubiquitous distributed systems whose current security relies primarily on server-side mechanisms. This paper makes the end-toend argument that the ...
Úlfar Erlingsson, V. Benjamin Livshits, Yin...