Sciweavers

2209 search results - page 155 / 442
» Language Based Secure Communication
Sort
View
TOOLS
2000
IEEE
15 years 9 months ago
Customization of Component-Based Object Request Brokers through Dynamic Reconfiguration
The success of distributed object technology, depends on the advent of Object Request Broker (ORB) architectures that are able to integrate flexible support for various nonfunctio...
Bo Nørregaard Jørgensen, Eddy Truyen...
JAVA
1999
Springer
15 years 9 months ago
The Gateway System: Uniform Web Based Access to Remote Resources
Exploiting our experience developing the WebFlow system, we designed the Gateway system to provide seamless and secure access to computational resources at ASC MSRC. The Gateway f...
Geoffrey Fox, Tomasz Haupt, Erol Akarsu, Alexey Ka...
IFIP
2009
Springer
15 years 2 months ago
A User Interface for a Game-Based Protocol Verification Tool
We present a platform that allows a protocol researcher to specify the sequence of games from an initial protocol to a protocol where the security property under consideration can ...
Peeter Laud, Ilja Tsahhirov
IFIP
2010
Springer
14 years 11 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
DAC
2009
ACM
15 years 2 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic