Sciweavers

3420 search results - page 212 / 684
» A Language-Based Approach to Security
Sort
View
KER
2006
70views more  KER 2006»
15 years 4 months ago
A theoretical inter-organizational trust-based security model
This work examines the interplay of inter-personal and inter-organizational trust, two distinct but related concepts, through a theoretic inter-organizational trust-based security...
Henry Hexmoor, Seth Wilson, Sandeep Bhattaram
115
Voted
VLDB
2002
ACM
165views Database» more  VLDB 2002»
15 years 4 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral
143
Voted
CSREASAM
2010
15 years 2 months ago
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation
We consider the telematics appliances, such as firewall, as a basic part of security system with specific preemptive priority queuing and access control algorithm oriented on multi...
Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey K...
SOCIALCOM
2010
15 years 2 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
140
Voted
AISS
2010
242views more  AISS 2010»
15 years 2 months ago
MLSF: A Framework for Multi-Level Secure Composite Web Services
Web services technologies change the software industry drastically by developing and integrating enterprise web services and applications in order to enable the users to access th...
J. G. R. Sathiaseelan, S. Albert Rabara, J. Ronald...