Sciweavers

5475 search results - page 142 / 1095
» Model Driven Security
Sort
View
CEEMAS
2005
Springer
15 years 6 months ago
SECMAP: A Secure Mobile Agent Platform
This paper describes a mobile agent platform, Secure Mobile Agent Platform (SECMAP), and its security infrastructure. Unlike other agent systems, SECMAP proposes a new agent model,...
Suat Ugurlu, Nadia Erdogan
114
Voted
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
15 years 7 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
85
Voted
JNW
2008
112views more  JNW 2008»
15 years 23 days ago
A Conceptual Model for Analysis and Design of Tunable Security Services
Security is an increasingly important issue for networked services. However, since networked environments may exhibit varying networking behavior and contain heterogeneous devices ...
Stefan Lindskog, Zoltán Faigl, Anna Brunstr...
113
Voted
ETRICS
2006
15 years 4 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
CSREASAM
2006
15 years 2 months ago
Trusted Storage: Focus on Use Cases
This paper describes use cases for the application of Trusted Computing Group (TCG) techniques and specifications to storage devices. The use cases fall into three broad categorie...
Robert Thibadeau, Michael Willett