Sciweavers

1970 search results - page 76 / 394
» Security Without Firewalls
Sort
View
ACSAC
2002
IEEE
15 years 4 months ago
A Security Architecture for Object-Based Distributed Systems
Large-scale distributed systems present numerous security problems not present in local systems. In this paper we present a general security architecture for a large-scale object-...
Bogdan C. Popescu, Maarten van Steen, Andrew S. Ta...
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 4 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
ESORICS
2000
Springer
15 years 3 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
DSONLINE
2006
79views more  DSONLINE 2006»
14 years 12 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
CASES
2010
ACM
14 years 10 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont