Sciweavers

3811 search results - page 17 / 763
» The Safe-Tcl Security Model
Sort
View
SISW
2003
IEEE
15 years 9 months ago
Information Security on the Logistical Network: An End-to-End Approach
We describe the information security aspects of logistical networking. The security model adopted by logistical networking is an end-to-end model that provides tunable security le...
Micah Beck, James S. Plank, Jeremy Millar, Scott A...
GRID
2005
Springer
15 years 9 months ago
Web services and grid security vulnerabilities and threats analysis and model
The paper provides an overview of available web applications and Web Services security vulnerability models and proposes a classification of the potential Grid and Web Services at...
Yuri Demchenko, Leon Gommans, Cees T. A. M. de Laa...
SACMAT
2009
ACM
15 years 10 months ago
Extending access control models with break-glass
Achim D. Brucker, Helmut Petritsch
ACISP
2008
Springer
15 years 10 months ago
Comparing the Pre- and Post-specified Peer Models for Key Agreement
In the pre-specified peer model for key agreement, it is assumed that a party knows the identifier of its intended communicating peer when it commences a protocol run. On the oth...
Alfred Menezes, Berkant Ustaoglu