Sciweavers

3638 search results - page 203 / 728
» Distribution chain security
Sort
View
JCS
1998
82views more  JCS 1998»
15 years 4 months ago
On SDSI's Linked Local Name Spaces
Rivest and Lampson have recently introduced SDSI, a Simple Distributed Security Infrastructure. One of the important innovations of SDSI is the use of linked local name spaces. Th...
Martín Abadi
ICIP
2006
IEEE
16 years 6 months ago
Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration
In this paper, we present a framework for the design of steganographic schemes that can provide provable security by achieving zero Kullback-Leibler divergence between the cover a...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
HICSS
2008
IEEE
144views Biometrics» more  HICSS 2008»
15 years 10 months ago
Frameworks for Securing Limited-Device Applications
In this paper, we compare the features available for developing secure distributed applications for limited devices, such as smart phones. We limit our scope to examine frameworks...
Timothy E. Lindquist, Aarthi Ramamurthy, Ramon Ang...
132
Voted
CONCUR
2001
Springer
15 years 8 months ago
Reasoning about Security in Mobile Ambients
The paper gives an assessment of security for Mobile Ambients, with specific focus on mandatory access control (MAC) policies in multilevel security systems. The first part of th...
Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
CSREASAM
2003
15 years 5 months ago
Developing Secure Web Services for Computational Portals
Computational web portals provide uniform access to remote computational resources--hardware, software, and data--by hiding the complexity of the heterogeneous, distributed, high ...
Choon-Han Youn, Marlon E. Pierce, Geoffrey Fox