Sciweavers

6555 search results - page 58 / 1311
» Secure attribute-based systems
Sort
View
SACMAT
2009
ACM
14 years 3 months ago
Extending access control models with break-glass
Achim D. Brucker, Helmut Petritsch
COMPSEC
2004
105views more  COMPSEC 2004»
13 years 8 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
14 years 3 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
14 years 3 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele
ICISS
2007
Springer
14 years 3 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash