Sciweavers

739 search results - page 77 / 148
» Security Challenges in Cloud Computing
Sort
View
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
15 years 11 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
SIGMOD
1998
ACM
89views Database» more  SIGMOD 1998»
15 years 8 months ago
Secure and Portable Database Extensibility
The functionality of extensible database servers can be augmented by user-de ned functions UDFs. However, the server's security and stability are concerns whenever new code...
Michael W. Godfrey, Tobias Mayr, Praveen Seshadri,...
SEC
2007
15 years 5 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
CORR
2010
Springer
225views Education» more  CORR 2010»
15 years 3 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
15 years 2 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens