Sciweavers

6555 search results - page 70 / 1311
» Secure attribute-based systems
Sort
View
ENTCS
2008
87views more  ENTCS 2008»
13 years 9 months ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel
CSREASAM
2006
13 years 10 months ago
SPS-VN: Research on the Security Policy System for Virtual Network
- In the area of network information security, it is necessary to study the security in the end-to-end communication. This paper proposes a theory of virtual network by end-to-end....
Guannan Gong, Liang Hu, Kuo Zhao, Jinxin He, Yuefe...
SP
2007
IEEE
101views Security Privacy» more  SP 2007»
14 years 3 months ago
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems
Ted Huffmire, Brett Brotherton, Gang Wang, Timothy...
ISSE
2006
13 years 8 months ago
Modeling security as a dependability attribute: a refinement-based approach
Abstract As distributed, networked computing systems become the dominant computing platform in a growing range of applications, they increase opportunities for security violations ...
Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani...
SIGOPSE
2004
ACM
14 years 2 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn