Sciweavers

2575 search results - page 48 / 515
» Providing security with insecure systems
Sort
View
ACSAC
2003
IEEE
15 years 7 months ago
PSOS Revisited
This paper provides a retrospective view of the design of SRI’s Provably Secure Operating System (PSOS), a formally specified tagged-capability hierarchical system architecture...
Peter G. Neumann, Richard J. Feiertag
NORDSEC
2009
Springer
15 years 6 months ago
Security Usability of Petname Systems
Abstract. To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to man...
Md. Sadek Ferdous, Audun Jøsang, Kuldeep Si...
ICDIM
2007
IEEE
15 years 8 months ago
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chu...
DBSEC
2000
117views Database» more  DBSEC 2000»
15 years 3 months ago
Database Security 2000
Database systems are being more and more used, with larger sized databases, and as components of very complex systems, that include numerous protocols. Database security problems ...
John R. Campbell
AAAI
1998
15 years 3 months ago
An Expert System for Alarm System Planning
This paper discusses the design and implementation of ESSPL, an expert system which generates security plans for alarm systems (Figure 1). Security planning is the task of determi...
Akira Tsurushima, Kenji Urushima, Daigo Sakata, Hi...