Sciweavers

12637 search results - page 99 / 2528
» Security for Extensible Systems
Sort
View
CCS
2009
ACM
14 years 3 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
IEEEARES
2007
IEEE
14 years 3 months ago
A Pattern System for Security Requirements Engineering
We present a pattern system for security requirements engineering, consisting of security problem frames and concretized security problem frames. These are special kinds of proble...
Denis Hatebur, Maritta Heisel, Holger Schmidt
FAST
2009
13 years 6 months ago
Story Book: An Efficient Extensible Provenance Framework
Most application provenance systems are hard coded for a particular type of system or data, while current provenance file systems maintain in-memory provenance graphs and reside i...
Richard P. Spillane, Russell Sears, Chaitanya Yala...
POPL
2000
ACM
14 years 1 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
ACSAC
2005
IEEE
14 years 2 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell