Large-scale distributed systems present numerous security problems not present in local systems. In this paper we present a general security architecture for a large-scale object-...
Bogdan C. Popescu, Maarten van Steen, Andrew S. Ta...
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...