Sciweavers

354 search results - page 10 / 71
» Key management for content access control in a hierarchy
Sort
View
AMC
2005
116views more  AMC 2005»
14 years 9 months ago
The design of integrating subliminal channel with access control
Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash function to compute their subord...
Narn-Yih Lee, Shu-Ya Yang
FC
2010
Springer
181views Cryptology» more  FC 2010»
15 years 1 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
WICON
2008
14 years 11 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...
WDAG
2005
Springer
104views Algorithms» more  WDAG 2005»
15 years 3 months ago
Polymorphic Contention Management
Abstract. In software transactional memory (STM) systems, a contention manager resolves conflicts among transactions accessing the same memory locations. Whereas atomicity and ser...
Rachid Guerraoui, Maurice Herlihy, Bastian Pochon
VR
2008
IEEE
129views Virtual Reality» more  VR 2008»
15 years 4 months ago
Object-Capability Security in Virtual Environments
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization, but also on context of usage such as distance or ...
Martin Scheffler, Jan P. Springer, Bernd Froehlich