Sciweavers

991 search results - page 15 / 199
» Foundations for Designing Secure Architectures
Sort
View
DAC
2002
ACM
15 years 10 months ago
System design methodologies for a wireless security processing platform
Srivaths Ravi, Anand Raghunathan, Nachiketh R. Pot...
CCS
2007
ACM
15 years 4 months ago
Analysis of three multilevel security architectures
Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectura...
Timothy E. Levin, Cynthia E. Irvine, Clark Weissma...
ACSAC
2000
IEEE
15 years 2 months ago
Extending Java for Package based Access Control
This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...
SWS
2005
ACM
15 years 3 months ago
Web services enterprise security architecture: a case study
Web Services (WS hereafter) Security is a crucial aspect for technologies based on this paradigm to be completely adopted by the industry. As a consequence, a lot of initiatives h...
Carlos Gutiérrez, Eduardo Fernández-...
ACMSE
2006
ACM
15 years 3 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin