Sciweavers

1154 search results - page 65 / 231
» Making Self-organizing Systems Secure
Sort
View
IFIPTM
2010
140views Management» more  IFIPTM 2010»
14 years 12 months ago
Shinren: Non-monotonic Trust Management for Distributed Systems
Abstract. The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust ma...
Changyu Dong, Naranker Dulay
QUANTUMCOMM
2009
Springer
15 years 8 months ago
The Case for Quantum Key Distribution
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructur...
Douglas Stebila, Michele Mosca, Norbert Lütke...
SACMAT
2009
ACM
15 years 8 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
IHI
2012
217views Healthcare» more  IHI 2012»
13 years 9 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 9 hour ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent