Sciweavers

2281 search results - page 217 / 457
» Security Patterns and Secure Systems Design
Sort
View
100
Voted
SACMAT
2004
ACM
15 years 6 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
106
Voted
CCS
2010
ACM
14 years 11 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
102
Voted
SOUPS
2009
ACM
15 years 7 months ago
Games for extracting randomness
Randomness is a necessary ingredient in various computational tasks and especially in Cryptography, yet many existing mechanisms for obtaining randomness suffer from numerous pro...
Ran Halprin, Moni Naor
SOFTWARE
2002
15 years 14 days ago
EROS: A Principle-Driven Operating System from the Ground Up
certain kinds of abstraction that modern operating systems generally include and seek a design that maps directly onto the features that modern hardware implementations provide; ve...
Jonathan S. Shapiro, Norman Hardy
96
Voted
MOBISYS
2007
ACM
16 years 12 days ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti