Sciweavers

987 search results - page 44 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
SACMAT
2004
ACM
15 years 5 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...
CCS
2007
ACM
15 years 5 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
SASP
2009
IEEE
238views Hardware» more  SASP 2009»
15 years 6 months ago
Hardware acceleration of multi-view face detection
—This paper presents a parallelized architecture for hardware acceleration of multi-view face detection. In our architecture, the multi-view face detection system generates rotat...
Junguk Cho, Bridget Benson, Ryan Kastner
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
15 years 5 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
USENIX
2003
15 years 29 days ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...