Sciweavers

582 search results - page 56 / 117
» Security and Privacy Challenges in Cloud Computing Environme...
Sort
View
LCTRTS
2009
Springer
14 years 3 months ago
Addressing the challenges of DBT for the ARM architecture
Dynamic binary translation (DBT) can provide security, virtualization, resource management and other desirable services to embedded systems. Although DBT has many benefits, its r...
Ryan W. Moore, José Baiocchi, Bruce R. Chil...
CCS
2008
ACM
13 years 11 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
CCS
2008
ACM
13 years 11 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
CSFW
2006
IEEE
14 years 3 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
SOUPS
2009
ACM
14 years 3 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner