Sciweavers

859 search results - page 113 / 172
» Security for Key Management Interfaces
Sort
View
SSDBM
2003
IEEE
118views Database» more  SSDBM 2003»
14 years 3 months ago
The CenSSIS Image Database
The CenSSIS Image Database System is a scientific database that enables effective data management and collaboration to accelerate fundamental research. This paper describes the d...
Huanmei Wu, Becky Norum, Judith Newmark, Betty Sal...
ACSAC
2010
IEEE
13 years 8 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
LOCA
2009
Springer
14 years 4 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
AAAI
2004
13 years 11 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
IPPS
2002
IEEE
14 years 2 months ago
Architecture of the Entropia Distributed Computing System
Distributed Computing, the exploitation of idle cycles on pervasive desktop PC systems offers the opportunity to increase the available computing power by orders of magnitude (10x...
Andrew A. Chien