Sciweavers

4111 search results - page 77 / 823
» Security, Protocols, and Trust
Sort
View
119
Voted
GD
2008
Springer
15 years 1 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
ACSW
2007
15 years 2 months ago
Securing Grid Data Using Mandatory Access Controls
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MACs), namely those provided by SELinux, to secure application-level data. Particu...
Matthew Henricksen, William J. Caelli, Peter R. Cr...
116
Voted
CCS
2010
ACM
14 years 11 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
68
Voted
ISI
2006
Springer
15 years 19 days ago
A Trust Model for Uncertain Interactions in Ubiquitous Environments
Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei...
95
Voted
SP
2010
IEEE
179views Security Privacy» more  SP 2010»
14 years 11 months ago
TrustVisor: Efficient TCB Reduction and Attestation
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zh...