Sciweavers

556 search results - page 7 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
72
Voted
NSDI
2008
14 years 12 months ago
Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model
In this paper, we discuss Bitfrost, the security model developed by the One Laptop Per Child project for its XO laptop computers. Bitfrost implements a number of security measures...
Meredith L. Patterson, Len Sassaman, David Chaum
86
Voted
AMAST
2006
Springer
15 years 1 months ago
A Computational Group Theoretic Symmetry Reduction Package for the Spin Model Checker
Abstract. Symmetry reduced model checking is hindered by two problems: how to identify state space symmetry when systems are not fully symmetric, and how to determine equivalence o...
Alastair F. Donaldson, Alice Miller
EUROCRYPT
2007
Springer
15 years 1 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
87
Voted
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 4 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
JSSPP
2010
Springer
14 years 7 months ago
Risk Aware Overbooking for Commercial Grids
Abstract. The commercial exploitation of the emerging Grid and Cloud markets needs SLAs to sell computing run times. Job traces show that users have a limited ability to estimate t...
Georg Birkenheuer, André Brinkmann, Holger ...