Sciweavers

5665 search results - page 338 / 1133
» Introduction to Computer Security
Sort
View
132
Voted
CCS
2007
ACM
15 years 8 months ago
Direct static enforcement of high-level security policies
A high-level security policy states an overall safety requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires ...
Qihua Wang, Ninghui Li
AVBPA
2005
Springer
282views Biometrics» more  AVBPA 2005»
15 years 8 months ago
Secure Fingerprint Matching with External Registration
Biometrics-based authentication systems offer enhanced security and user convenience compared to traditional token-based (e.g., ID card) and knowledge-based (e.g., password) system...
James Reisman, Umut Uludag, Arun Ross
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
15 years 7 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
15 years 6 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
ACSAC
2004
IEEE
15 years 6 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong