Sciweavers

6555 search results - page 9 / 1311
» Secure attribute-based systems
Sort
View
108
Voted
IEEEARES
2010
IEEE
15 years 6 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
15 years 3 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
98
Voted
SP
1999
IEEE
197views Security Privacy» more  SP 1999»
15 years 4 months ago
20 Years of Operating Systems Security
Virgil D. Gligor
81
Voted
ESORICS
1998
Springer
15 years 3 months ago
Dealing with Multi-policy Security in Large Open Distributed Systems
Christophe Bidan, Valérie Issarny