Sciweavers

14850 search results - page 32 / 2970
» The Security of
Sort
View
ACISP
2006
Springer
14 years 2 months ago
Graphical Representation of Authorization Policies for Weighted Credentials
Isaac Agudo, Javier Lopez, José A. Monteneg...
ACISP
2006
Springer
14 years 2 months ago
Cache Based Power Analysis Attacks on AES
Jacques J. A. Fournier, Michael Tunstall
ACSAC
2005
IEEE
14 years 2 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell