Sciweavers

988 search results - page 140 / 198
» Cryptographic access control in a distributed file system
Sort
View
NDSS
2009
IEEE
15 years 6 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
DBSEC
2003
115views Database» more  DBSEC 2003»
15 years 1 months ago
Administration Rights in the SDSD-System
The SDSD-system offers state-dependent access control in distributed object systems. The system enforces protocols which declare sets of activity sequences as allowed, thereby for...
Joachim Biskup, Thomas Leineweber, Joerg Parthe
ICPPW
2005
IEEE
15 years 5 months ago
Content Oriented Communications for Emergencies in Wireless Environments
In the conventional WWW search or P2P file sharing systems, users search for some information by using the Explicit Information such as keywords, addresses or content names. Howev...
Kazuya Sakai, Hiroki Nakano, Akiko Nakaniwa, Hiroy...
TGC
2005
Springer
15 years 5 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
PODC
2012
ACM
13 years 2 months ago
On the (limited) power of non-equivocation
In recent years, there have been a few proposals to add a small amount of trusted hardware at each replica in a Byzantine fault tolerant system to cut back replication factors. Th...
Allen Clement, Flavio Junqueira, Aniket Kate, Rodr...