Sciweavers

1240 search results - page 221 / 248
» Trusted Design in FPGAs
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 22 days ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
WETICE
1998
IEEE
14 years 22 days ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
14 years 15 days ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell
SOUPS
2010
ACM
14 years 11 days ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
ICDS
2007
IEEE
14 years 10 days ago
A Practical Synthesis of Dynamic Role Settings in Telecare Services
- Role provisioning is an essential yet complex aspect of the design of virtual organisations. This paper addresses an even more complex scenario, that of role provisioning in tele...
Ying Liu, Jean Bacon