Sciweavers

2281 search results - page 219 / 457
» Security Patterns and Secure Systems Design
Sort
View
112
Voted
CCS
2006
ACM
15 years 4 months ago
TCG inside?: a note on TPM specification compliance
The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the secu...
Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St&...
SAINT
2007
IEEE
15 years 7 months ago
Proposal of Constructing PKI on Overlay Network
In this paper, we present the design of foundation PKI (fPKI), a PKI system constructed on an overlay network for an open source community. fPKI can provide an alternative PKI sys...
Yukio Okada, Hiroaki Hazeyama, Youki Kadobayashi
105
Voted
AGENTS
2001
Springer
15 years 5 months ago
CMPack: a complete software system for autonomous legged soccer robots
This paper describes a completely implemented, fully autonomous software system for soccer playing quadruped robots. The system includes real-time color vision, probabilistic loca...
Scott Lenser, James Bruce, Manuela M. Veloso
103
Voted
CCS
2004
ACM
15 years 6 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
SACMAT
2011
ACM
14 years 3 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali