Sciweavers

1139 search results - page 217 / 228
» Trust Management Survey
Sort
View
ICMCS
2007
IEEE
104views Multimedia» more  ICMCS 2007»
14 years 2 months ago
A Perception-based Scalable Encryption Model for AVS Audio
Audio Video coding Standard (AVS) is China’s secondgeneration source coding/decoding standard with fully Intellectual Properties. As the sixth part of AVS standard, AVSDRM aims ...
Lan Juan, Huang Tie-Jun, Qu Jun-Hua
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 2 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
CCS
2007
ACM
14 years 2 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
IFIP
2007
Springer
14 years 2 months ago
Capable Leader and Skilled and Motivated Team Practices to Introduce eXtreme Programming
Abstract. Applying changes to software engineering processes in organisations usually raises many problems of varying nature. Basing on a real-world 2-year project and a simultaneo...
Lech Madeyski, Wojciech Biela
TGC
2007
Springer
14 years 2 months ago
A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a c...
Ricardo Corin, Pierre-Malo Deniélou