Sciweavers

3516 search results - page 607 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
135
Voted
WISEC
2010
ACM
15 years 10 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
116
Voted
ACSAC
2003
IEEE
15 years 9 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
122
Voted
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 7 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
151
Voted
PVLDB
2010
117views more  PVLDB 2010»
15 years 2 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
122
Voted
ECHT
1992
15 years 7 months ago
SEPIA: A Cooperative Hypermedia Authoring Environment
In this paper, we report about the design, development, and implementation of the SEPIA cooperative hypermedia authoring environment. It provides results on the following aspects ...
Norbert A. Streitz, Jörg M. Haake, Jörg ...