Sciweavers

186 search results - page 29 / 38
» New Frontiers of Network Security: The Threat Within
Sort
View
STORAGESS
2005
ACM
15 years 3 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
AGENTS
1998
Springer
15 years 1 months ago
Issues in Temporal Reasoning for Autonomous Control Systems
Deep Space One will be the rst spacecraft to be controlled by an autonomous agent potentially capable of carrying out a complete mission with minimal commandingfrom Earth. The New...
Nicola Muscettola, Paul H. Morris, Barney Pell, Be...
86
Voted
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 3 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...
SECURWARE
2008
IEEE
15 years 3 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
EUROCRYPT
2007
Springer
15 years 3 months ago
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Protocols proven secure within the universal composability (UC) framework satisfy strong and desirable security properties. Unfortunately, it is known that within the “plain” m...
Jonathan Katz