Sciweavers

414 search results - page 51 / 83
» Secure Border Control Processes
Sort
View
JODS
2007
138views Data Mining» more  JODS 2007»
14 years 11 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
SAC
2009
ACM
15 years 4 months ago
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal
The firmware of an electronic voting machine is typically treated as a “trusted” component of the system. Consequently, it is misconstrued to be vulnerable only to an insider...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
IFIP
2004
Springer
15 years 5 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci
IPPS
2005
IEEE
15 years 5 months ago
IPSec Implementation on Xilinx Virtex-II Pro FPGA and Its Application
In this paper, we propose an IPSec implementation on Xilinx Virtex-II Pro FPGA1 . We move the key management and negotiation into software function calls that run on the PowerPC p...
Jing Lu, John W. Lockwood
ACSAC
2007
IEEE
15 years 6 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth