Sciweavers

325 search results - page 10 / 65
» Secure safe ambients
Sort
View
MAS
1998
Springer
14 years 24 days ago
The Safe-Tcl Security Model
John K. Ousterhout, Jacob Y. Levy, Brent B. Welch
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 2 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
OOPSLA
2000
Springer
14 years 4 days ago
An approach to safe object sharing
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-oriented...
Ciarán Bryce, Chrislain Razafimahefa
SACMAT
2004
ACM
14 years 2 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
IEEEARES
2009
IEEE
14 years 3 months ago
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation
Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...