Sciweavers

830 search results - page 127 / 166
» Owned Policies for Information Security
Sort
View
DIM
2007
ACM
15 years 3 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
81
Voted
SIGSOFT
2008
ACM
16 years 16 days ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
ICA3PP
2011
Springer
13 years 11 months ago
Performance Analysis of Preemption-Aware Scheduling in Multi-cluster Grid Environments
Abstract. Resource provisioning is one of the main challenges in resource sharing environments such as multi-cluster Grids. In these environments each cluster serves requests from ...
Mohsen Amini Salehi, Bahman Javadi, Rajkumar Buyya
IEEEARES
2009
IEEE
15 years 6 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop
IH
2001
Springer
15 years 4 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn