Sciweavers

14850 search results - page 32 / 2970
» The Security of
Sort
View
ACISP
2006
Springer
15 years 10 months ago
Graphical Representation of Authorization Policies for Weighted Credentials
Isaac Agudo, Javier Lopez, José A. Monteneg...
ACISP
2006
Springer
15 years 10 months ago
Cache Based Power Analysis Attacks on AES
Jacques J. A. Fournier, Michael Tunstall
ACSAC
2005
IEEE
15 years 10 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell