Sciweavers

6555 search results - page 69 / 1311
» Secure attribute-based systems
Sort
View
DGO
2003
118views Education» more  DGO 2003»
13 years 10 months ago
Enabling Email Confidentiality through the use of Opportunistic Encryption
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Simson L. Garfinkel
HASE
2008
IEEE
14 years 3 months ago
A Few Remarks about Formal Development of Secure Systems
—Formal methods provide remarkable tools allowing for high levels of confidence in the correctness of developments. Their use is therefore encouraged, when not required, for the...
Éric Jaeger, Thérèse Hardin
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
14 years 2 months ago
CANDI: A System for Classifying the Security Risks in Network Appliances
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user a...
Joseph G. Tront, Randy C. Marchany
HICSS
1998
IEEE
135views Biometrics» more  HICSS 1998»
14 years 1 months ago
The Architecture of Secure Systems
Secure system design, veri cation and validation is often a daunting task, involving the merger of various protection mechanisms in conjunction with system security policy and con...
Jim Alves-Foss
DRM
2004
Springer
14 years 2 months ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...