Sciweavers

4330 search results - page 114 / 866
» Analyzing security architectures
Sort
View
174
Voted
ICSR
2011
Springer
14 years 8 months ago
Software Reuse and Safety
With the move to distributed, component based systems involving reuse of components and services, emergent, system-wide properties, including safety and security in particular, are...
William B. Frakes, John M. Favaro
133
Voted
CRYPTOLOGIA
2010
15 years 2 months ago
Internet Voting Protocol Based on Improved Implicit Security
This paper presents an improved protocol for Internet voting that allows recasting of ballots to eliminate voting errors, encourages early voting and provides an opportunity for c...
Abhishek Parakh, Subhash Kak
CCS
2007
ACM
15 years 11 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
ASPLOS
2006
ACM
15 years 11 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
ISCC
2005
IEEE
15 years 10 months ago
Virtual Machine Management for Tele-Lab "IT-Security" Server
Tele-Lab “IT-Security” Server is a new concept for practical security education. The Tele-lab server builds a virtual security laboratory using lightweight virtual machines an...
Ji Hu, Dirk Cordel, Christoph Meinel