Sciweavers

125 search results - page 3 / 25
» Certificate Based Authorization Simulation System
Sort
View
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
14 years 13 hour ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
JCS
2006
118views more  JCS 2006»
13 years 6 months ago
Language based policy analysis in a SPKI Trust Management System
Abstract-- SPKI/SDSI is a standard for issuing authorization and name certificates. SPKI/SDSI can be used to implement a Trust Management System, where the policy for resource acce...
Arun K. Eamani, A. Prasad Sistla
CCS
2009
ACM
13 years 10 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
SAC
2002
ACM
13 years 6 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
WSC
2008
13 years 8 months ago
A simulation based system for analysis and design of production control systems
We present aspects of a simulated based system for analyzing and designing production control systems. The core of the system is a simulation of a manufacturing system operating w...
Corinne MacDonald, Eldon A. Gunn