Sciweavers

3605 search results - page 143 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
FC
2007
Springer
104views Cryptology» more  FC 2007»
14 years 2 months ago
A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed?
In this paper, we investigate how existing theoretical contributions on usable security can serve to guide the design of a specific system. We illustrate how going through this the...
Jakob Illeborg Pagter, Marianne Graves Petersen
CAV
2010
Springer
181views Hardware» more  CAV 2010»
14 years 1 days ago
Policy Monitoring in First-Order Temporal Logic
We present an approach to monitoring system policies. As a specification language, we use an expressive fragment of a temporal logic, which can be effectively monitored. We repor...
David A. Basin, Felix Klaedtke, Samuel Müller
TDSC
2008
125views more  TDSC 2008»
13 years 8 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar
EUROCRYPT
1998
Springer
14 years 10 days ago
Quorum-Based Secure Multi-party Computation
Abstract. This paper describes e cient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to...
Donald Beaver, Avishai Wool
USS
2010
13 years 6 months ago
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitiv...
Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkat...