Sciweavers

3605 search results - page 179 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
AINA
2009
IEEE
15 years 3 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
TAPSOFT
1997
Springer
15 years 2 months ago
A Type-Based Approach to Program Security
This paper presents a type system which guarantees that well-typed programs in a procedural programming language satisfy a noninterference security property. With all program input...
Dennis M. Volpano, Geoffrey Smith
IEEESCC
2006
IEEE
15 years 4 months ago
Multiagent Policy Architecture for Virtual Business Organizations
A virtual organization (VO) is a dynamic collection of entities (individuals, enterprises, and information resources) collaborating on some computational activity. VOs are an emer...
Yathiraj B. Udupi, Munindar P. Singh
MOBIQUITOUS
2008
IEEE
15 years 4 months ago
A secure middleware for wireless sensor networks
SMEPP Light is a middleware for Wireless Sensor Networks (WSNs) based on mote-class sensors. It is derived from the specification developed under the framework of the SMEPP proje...
Claudio Vairo, Michele Albano, Stefano Chessa
100
Voted
ACSAC
2009
IEEE
15 years 2 months ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning