Sciweavers

3605 search results - page 127 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
FECS
2006
106views Education» more  FECS 2006»
13 years 9 months ago
A Software System for Secure Computer Aided Exams
Erden Basar, Bulent Genc
COMCOM
2008
62views more  COMCOM 2008»
13 years 8 months ago
Secure multi-mode systems and their applications for pervasive computing
Submissions should include an abstract, 5-10 key words, and the e
Jong Hyuk Park, Hsiao-Hwa Chen, Antonio Coronato, ...
TISSEC
2008
104views more  TISSEC 2008»
13 years 8 months ago
Toward a Usage-Based Security Framework for Collaborative Computing Systems
Xinwen Zhang, Masayuki Nakae, Michael J. Covington...
SRDS
2003
IEEE
14 years 1 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
CCS
2008
ACM
13 years 10 months ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...