Sciweavers

2335 search results - page 163 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
ESCIENCE
2006
IEEE
15 years 11 months ago
A Synchronous Multimedia Annotation System for Secure Collaboratories
In this paper, we describe the Vannotea system - an application designed to enable collaborating groups to discuss and annotate collections of high quality images, video, audio or...
Ronald Schroeter, Jane Hunter, Jonathon Guerin, Im...
GLOBECOM
2010
IEEE
15 years 3 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
174
Voted
JAVA
1999
Springer
15 years 9 months ago
The Gateway System: Uniform Web Based Access to Remote Resources
Exploiting our experience developing the WebFlow system, we designed the Gateway system to provide seamless and secure access to computational resources at ASC MSRC. The Gateway f...
Geoffrey Fox, Tomasz Haupt, Erol Akarsu, Alexey Ka...
152
Voted
DSOM
2003
Springer
15 years 10 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
152
Voted
TISSEC
2010
121views more  TISSEC 2010»
15 years 3 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...