Sciweavers

1597 search results - page 54 / 320
» Mental Models of Computer Security
Sort
View
EUROPAR
2007
Springer
15 years 3 months ago
Evaluation of a Utility Computing Model Based on the Federation of Grid Infrastructures
Utility computing is a service provisioning model which will provide adaptive, flexible and simple access to computing resources, enabling a pay-per-use model for computing simila...
Constantino Vázquez, Eduardo Huedo, Rub&eac...
AINA
2007
IEEE
15 years 8 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
IEEEARES
2006
IEEE
15 years 8 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
ISF
2008
114views more  ISF 2008»
15 years 1 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan