Sciweavers

1154 search results - page 100 / 231
» Making Self-organizing Systems Secure
Sort
View
CIDR
2009
113views Algorithms» more  CIDR 2009»
15 years 2 months ago
Remembrance: The Unbearable Sentience of Being Digital
We introduce a world vision in which data is endowed with memory. In this data-centric systems paradigm, data items can be enabled to retain all or some of their previous values. ...
Ragib Hasan, Radu Sion, Marianne Winslett
CCS
2005
ACM
15 years 7 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
127
Voted
CCS
2005
ACM
15 years 7 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
152
Voted
SOUPS
2010
ACM
15 years 5 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
WISEC
2010
ACM
15 years 1 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig