Sciweavers

2335 search results - page 132 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
ACMSE
2006
ACM
15 years 11 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
GPC
2007
Springer
15 years 8 months ago
Bio-inspired Grid Information System with Epidemic Tuning
g Service Oriented Abstractions for the Wireless Sensor Grid Edgardo Aviles-Lopez, J. Antonio Garcia-Macias Implementation of OSD Security Framework and Credential Cache Gu Su Kim,...
Agostino Forestiero, Carlo Mastroianni, Fausto Pup...
CCS
2006
ACM
15 years 8 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
ACSAC
2006
IEEE
15 years 11 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
SAC
2000
ACM
15 years 9 months ago
Making Tuple Spaces Safe for Heterogeneous Distributed Systems
Linda is a high level communication model which allows agents to communicate via a shared tuple spaces without knowing each other’s identities and without having to arrange for ...
Naftaly H. Minsky, Yaron Minsky, Victoria Ungurean...