Sciweavers

63 search results - page 11 / 13
» Operating System Controlled Processor-Memory Bus Encryption
Sort
View
69
Voted
HICSS
2002
IEEE
89views Biometrics» more  HICSS 2002»
15 years 2 months ago
Nash Strategies for Load Serving Entities in Dynamic Energy Multi-markets
In this paper the problem of developing bidding strategies for the participants of dynamic energy-multi markets is studied. Attention is given to strategic bidding of load serving...
Jose B. Cruz Jr., Ashkan Kian
76
Voted
RTSS
2007
IEEE
15 years 3 months ago
Static-Priority Scheduling over Wireless Networks with Multiple Broadcast Domains
We propose a wireless medium access control (MAC) protocol that provides static-priority scheduling of messages in a guaranteed collision-free manner. Our protocol supports multip...
Nuno Pereira, Björn Andersson, Eduardo Tovar,...
78
Voted
WPES
2003
ACM
15 years 2 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
FROCOS
2007
Springer
15 years 3 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
SACMAT
2004
ACM
15 years 2 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...