Sciweavers

2335 search results - page 92 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
SACMAT
2004
ACM
15 years 10 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
GCC
2003
Springer
15 years 10 months ago
Information Grid Toolkit: Infrastructure of Shanghai Information Grid
A fundamental problem that confronts Shanghai Information Grid is to adopt a good Grid toolkit, since the “de facto” standard Globus Toolkit does not support Information Grid w...
Xinhua Lin, Qianni Deng, Xinda Lu
FAST
2009
15 years 2 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
COLCOM
2007
IEEE
15 years 11 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
IAW
2003
IEEE
15 years 10 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.