Sciweavers

235 search results - page 10 / 47
» Trust management for secure information flows
Sort
View
TRUST
2009
Springer
14 years 2 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
DISCEX
2003
IEEE
14 years 27 days ago
Fault-Tolerant Mesh of Trust Applied to DNS Security
The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result...
Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, N...
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
14 years 2 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
ESORICS
2011
Springer
12 years 7 months ago
Automated Information Flow Analysis of Virtualized Infrastructures
The use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the...
Sören Bleikertz, Thomas Groß, Matthias ...
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 7 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen