Sciweavers

3605 search results - page 186 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
CODES
2005
IEEE
15 years 6 months ago
FIDES: an advanced chip multiprocessor platform for secure next generation mobile terminals
We propose a secure platform on a chip multiprocessor, known as FIDES, in order to enable next generation mobile terminals to execute downloaded native applications for Linux. Its...
Hiroaki Inoue, Akihisa Ikeno, Masaki Kondo, Junji ...
ASWC
2006
Springer
15 years 6 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
ETRICS
2006
15 years 8 months ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
ACSAC
2006
IEEE
15 years 8 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
CCS
1994
ACM
15 years 8 months ago
Endorsements, Licensing, and Insurance for Distributed System Services
Clients in a distributedsystem place their con dencein many servers, and servers themselves rely on other servers for le storage, authentication, authorization, and payment. When ...
Gennady Medvinsky, Charlie Lai, B. Clifford Neuman