Sciweavers

ACSAC
2000
IEEE
14 years 1 days ago
Security Architectures for Controlled Digital Information Dissemination
Jaehong Park, Ravi S. Sandhu, J. Schifalacqua
ACSAC
2000
IEEE
14 years 1 days ago
Experience with Software Watermarking
Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di M...
ACSAC
2000
IEEE
14 years 1 days ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger
ACSAC
2000
IEEE
14 years 1 days ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
ACSAC
2000
IEEE
14 years 1 days ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim
ACSAC
2000
IEEE
14 years 1 days ago
Enabling Secure On-Line DNS Dynamic Update
Domain Name System (DNS) is the system for the mapping between easily memorizable host names and their IP addresses. Due to its criticality, security extensions to DNS have been p...
Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine
ACSAC
2000
IEEE
14 years 1 days ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
ACSAC
2000
IEEE
14 years 1 days ago
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip
The performance of RSA hardware is primarily determined by an efficient implementation of the long integer modular arithmetic and the ability to utilize the Chinese Remainder The...
Johann Großschädl