Sciweavers

1240 search results - page 211 / 248
» Trusted Design in FPGAs
Sort
View
CCS
2009
ACM
14 years 3 months ago
Towards secure dataflow processing in open distributed systems
Open distributed systems such as service oriented architecture and cloud computing have emerged as promising platforms to deliver software as a service to users. However, for many...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
APNOMS
2009
Springer
14 years 3 months ago
IP Prefix Hijacking Detection Using Idle Scan
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacki...
Seong-Cheol Hong, Hong-Taek Ju, James W. Hong
MDAI
2009
Springer
14 years 3 months ago
A Consensus Reaching Model for Web 2.0 Communities
Web 2.0 Communities allow large amounts of users to interact with each others. In fact, new Web 2.0 technologies allow to share resources and information in an easy and timely mann...
Sergio Alonso, Ignacio J. Pérez, Francisco ...
SACMAT
2009
ACM
14 years 3 months ago
A semantic web based framework for social network access control
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community o...
Barbara Carminati, Elena Ferrari, Raymond Heatherl...
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
14 years 2 months ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan