Sciweavers

70 search results - page 5 / 14
» sp 2007
Sort
View
GLOBECOM
2007
IEEE
14 years 1 months ago
Capacity Assignment for Delay Bounded Packet Traffic
The capacity assignment (CA) problem is one of the most essential yet important topics in packet communication networks. However, most reported CA models were established under the...
Xian Liu
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
14 years 4 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
14 years 4 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
SP
2007
IEEE
120views Security Privacy» more  SP 2007»
14 years 4 months ago
Endorsed E-Cash
An electronic cash (e-cash) scheme lets a user withdraw money from a bank and then spend it anonymously. E-cash can be used only if it can be securely and fairly exchanged for ele...
Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 4 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen