Sciweavers

2024 search results - page 18 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
ICDCSW
2003
IEEE
15 years 7 months ago
ContextCube - Providing Context Information Ubiquitously
Sensing the state of the environment is an important source for context-aware applications. Several approaches exist to provide sensor information to mobile application nodes. As ...
Martin Bauer, Christian Becker, Jörg Häh...
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 8 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
111
Voted
DANCE
2002
IEEE
15 years 6 months ago
Janos: A Java-Oriented OS for Active Network Nodes
Janos is an operating system for active network nodes whose primary focus is strong resource management and control of untrusted active applications written in Java. Janos include...
Patrick Tullmann, Mike Hibler, Jay Lepreau
144
Voted
PERCOM
2003
ACM
16 years 1 months ago
Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services
In pervasive computing environments, powerful handheld devices with wireless connections create opportunities for many new nomadic applications. We propose a new service discovery...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
123
Voted
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 8 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...