Sciweavers

1587 search results - page 183 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
IFIPTM
2009
149views Management» more  IFIPTM 2009»
14 years 8 months ago
An Experimental Testbed for Evaluation of Trust and Reputation Systems
Abstract. To date, trust and reputation systems have often been evaluated using methods of their designers' own devising. Recently, we demonstrated that a number of noteworthy...
Reid Kerr, Robin Cohen
DAC
2005
ACM
15 years 4 days ago
A watermarking system for IP protection by a post layout incremental router
In this paper, we introduce a new watermarking system for IP protection on post-layout design phase. Firstly the copyright is encrypted by DES (Data Encryption Standard) and then ...
Tingyuan Nie, Tomoo Kisaka, Masahiko Toyonaga
SACMAT
2009
ACM
15 years 4 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
MMMACNS
2001
Springer
15 years 2 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
SACMAT
2006
ACM
15 years 4 months ago
Towards reasonability properties for access-control policy languages
The growing importance of access control has led to the definition of numerous languages for specifying policies. Since these languages are based on different foundations, langua...
Michael Carl Tschantz, Shriram Krishnamurthi