Sciweavers

4111 search results - page 147 / 823
» Security, Protocols, and Trust
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 2 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
ENTCS
2007
79views more  ENTCS 2007»
13 years 10 months ago
Towards Trustworthy Spatial Messaging
Spatial messaging is a term that defines the virtual publication of data in physical places. Generally, anyone in the neighborhood of such a publication point gets the message. F...
Michel Deriaz, Jean-Marc Seigneur
CNSR
2010
IEEE
124views Communications» more  CNSR 2010»
14 years 22 days ago
Challenges and Direction toward Secure Communication in the SCADA System
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
Sugwon Hong, Myungho Lee
FC
1998
Springer
96views Cryptology» more  FC 1998»
14 years 2 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss
IMA
2001
Springer
78views Cryptology» more  IMA 2001»
14 years 2 months ago
Unconditionally Secure Key Agreement Protocol
Abstract. The key agreement protocol are either based on some computational infeasability, such as the calculus of the discrete logarithm in [1], or on theoretical impossibility un...
Cyril Prissette