Sciweavers

47 search results - page 3 / 10
» PAMINA: A Certificate Based Privilege Management System
Sort
View
DPD
2002
66views more  DPD 2002»
13 years 5 months ago
A Reference Architecture for the Certification of E-Services in a Digital Government Infrastructure
Certifying the execution of a service is a critical issue for an e-government infrastructure. In fact being able to document that an e-service was actually carried out, given the l...
Franco Arcieri, Giovanna Melideo, Enrico Nardelli,...
COMPSAC
2003
IEEE
13 years 10 months ago
PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications
Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm mo...
Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I-Ling Ye...
CCS
2010
ACM
13 years 5 months ago
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike exi...
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ...
COMCOM
2008
138views more  COMCOM 2008»
13 years 5 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ISI
2004
Springer
13 years 11 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho