Sciweavers

203 search results - page 25 / 41
» A Secure PLAN
Sort
View
ISSE
2008
15 years 1 months ago
Challenges for the Protection of Critical ICT-Based Financial Infrastructures
Abstract: This paper, entitled Challenges for the Protection of Critical ICTBased Financial Infrastructures for the next 5 years, will describe the outcomes of a recently held work...
Bernhard M. Hämmerli, Henning H. Arendt
PTS
2008
123views Hardware» more  PTS 2008»
15 years 1 months ago
Model-Based Firewall Conformance Testing
Firewalls are a cornerstone of todays security infrastructure for networks. Their configuration, implementing a firewall policy, is inherently complex, hard to understand, and diff...
Achim D. Brucker, Lukas Brügger, Burkhart Wol...
NDSS
1997
IEEE
15 years 4 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
NSDI
2008
15 years 2 months ago
Ad-hoc Guesting: When Exceptions Are the Rule
People's work days are filled with exceptions to normal routine. These exceptions affect the security and privacy of their information access and sharing. In a recent ethnogr...
Brinda Dalal, Les Nelson, Diana K. Smetters, Natha...
CSFW
2006
IEEE
15 years 5 months ago
Policy Analysis for Administrative Role Based Access Control
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....