Sciweavers

68 search results - page 13 / 14
» A Computational Framework for Certificate Policy Operations
Sort
View
NBIS
2007
Springer
13 years 11 months ago
Multilayer Quality and Grade of Service Support for High Speed GMPLS IP/DWDM Networks
IP over optical networks controlled by the GMPLS control plane have become the common infrastructure for a variety of services, such as triple play and grid applications. The traff...
Walter Colitti, Kris Steenhaut, Ann Nowé, J...
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
13 years 9 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
13 years 11 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
SIGCOMM
2009
ACM
13 years 12 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
CCS
2010
ACM
14 years 5 days ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall