In this article, we describe a new architecture providing the access control service in both ATM and IPover-ATM networks. This architecture is based on agents distributed in netwo...
The ATM Forum international consortium recently approved the first version of its security specifications aiming to protect communications over Asynchronous Transfer Mode (ATM) ne...
Maryline Laurent, Ahmed Bouabdallah, Christophe De...
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
A smart card runtime environment must provide the proper transaction support for the reliable update of data, especially on multiapplication cards like the Java Card. The transact...
JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release...
Charlie Lai, Li Gong, Larry Koved, Anthony J. Nada...
This paper reports on an ongoing effort to define the security architecture for the Joint Simulation System (JSIMS), a joint military modeling and simulation system. It also descr...
We propose in this paper a practical and secure electronic voting protocol for large-scale online elections. Our protocol satisfies a large set of important criteria that has neve...
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...