Sciweavers

1353 search results - page 38 / 271
» Securing Current and Future Process Control Systems
Sort
View
116
Voted
SACMAT
2005
ACM
15 years 8 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
PEWASUN
2005
ACM
15 years 8 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari
136
Voted
CSFW
1995
IEEE
15 years 6 months ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
ESORICS
2009
Springer
16 years 3 months ago
A Privacy Preservation Model for Facebook-Style Social Network Systems
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao
121
Voted
CCS
2007
ACM
15 years 8 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...