Sciweavers

1154 search results - page 38 / 231
» Making Self-organizing Systems Secure
Sort
View
ACSAC
2005
IEEE
15 years 7 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
151
Voted
ICIAR
2010
Springer
15 years 6 months ago
Secure Iris Recognition Based on Local Intensity Variations
In this paper we propose a fast and efficient iris recognition algorithm which makes use of local intensity variations in iris textures. The presented system provides fully revocab...
Christian Rathgeb, Andreas Uhl
WS
2004
ACM
15 years 6 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
DSONLINE
2006
79views more  DSONLINE 2006»
15 years 1 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
SACMAT
2009
ACM
15 years 7 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger