Sciweavers

50 search results - page 5 / 10
» Security and Privacy Landscape in Emerging Technologies
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten
WETICE
1998
IEEE
13 years 11 months ago
Efficient Security for Large and Dynamic Multicast Groups
Proposals for multicast security that have been published so far are complex, often require trust in network components or are inefficient. In this paper we propose a series of no...
Germano Caronni, Marcel Waldvogel, Dan Sun, Bernha...
CCS
2006
ACM
13 years 11 months ago
Daonity: grid security with behaviour conformity from trusted computing
A central security requirement for grid computing can be referred to as behaviour conformity. This is an assurance that ad hoc related principals (users, platforms or instruments)...
Wenbo Mao, Fei Yan, Chunrun Chen
ACSAC
2001
IEEE
13 years 11 months ago
Information Security: Science, Pseudoscience, and Flying Pigs
The state of the science of information security is astonishingly rich with solutions and tools to incrementally and selectively solve the hard problems. In contrast, the state of...
Roger R. Schell
ACSAC
2002
IEEE
14 years 15 days ago
Security Architecture of the Austrian Citizen Card Concept
When admitting electronic media as a means for citizens to approach public authorities – i.e., when advancing official proceedings towards e-Government – security is an indisp...
Herbert Leitold, Arno Hollosi, Reinhard Posch