Sciweavers

2517 search results - page 101 / 504
» Secure Deployment of Components
Sort
View
122
Voted
CNSM
2010
15 years 1 months ago
A performance view on DNSSEC migration
In July 2008, the Kaminsky attack showed that DNS is sensitive to cache poisoning, and DNSSEC is considered the long term solution to mitigate this attack. A lot of technical docum...
Daniel Migault, Cedric Girard, Maryline Laurent
150
Voted
DBSEC
2001
129views Database» more  DBSEC 2001»
15 years 4 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu
131
Voted
AES
2004
Springer
151views Cryptology» more  AES 2004»
15 years 9 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
114
Voted
CAV
2010
Springer
214views Hardware» more  CAV 2010»
15 years 7 months ago
Learning Component Interfaces with May and Must Abstractions
elor Thesis: Demand Driven Abstraction Refinement • Advisor: Dr. Andrey Rybalchenko Kendriya Vidyalaya ONGC, Dehradun, Uttaranchal INDIA All India Senior Secondary Examination, ...
Rishabh Singh, Dimitra Giannakopoulou, Corina S. P...
151
Voted
MA
1999
Springer
133views Communications» more  MA 1999»
15 years 7 months ago
Establishing a Secure Open-Environment for Using Mobile Agents in Electronic Commerce
Although mobile agents are a promising technology, the large-scale deployment of agents and the existence of hosts running agencies will not happen until proper security mechanism...
Paulo Marques, Luís Moura Silva, Joã...