Sciweavers

2024 search results - page 17 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
ECOOP
2012
Springer
13 years 4 months ago
Enhancing JavaScript with Transactions
Abstract. Transcript is a system that enhances JavaScript with support for transactions. Hosting Web applications can use transactions to demarcate regions that contain untrusted g...
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
111
Voted
ACSAC
2000
IEEE
15 years 6 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
ICICS
2007
Springer
15 years 5 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
102
Voted
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 3 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
95
Voted
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
15 years 7 months ago
CANDI: A System for Classifying the Security Risks in Network Appliances
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user a...
Joseph G. Tront, Randy C. Marchany