Sciweavers

1081 search results - page 153 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
SACMAT
2010
ACM
14 years 1 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
ATC
2009
Springer
14 years 2 days ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
USENIX
1994
13 years 10 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
IMC
2006
ACM
14 years 2 months ago
On unbiased sampling for unstructured peer-to-peer networks
This paper addresses the difficult problem of selecting representative samples of peer properties (e.g., degree, link bandwidth, number of files shared) in unstructured peer-to-p...
Daniel Stutzbach, Reza Rejaie, Nick G. Duffield, S...
CCS
2007
ACM
14 years 23 days ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...