Sciweavers

902 search results - page 41 / 181
» Security and Trust Requirements Engineering
Sort
View
SACMAT
2004
ACM
15 years 3 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
TRUST
2010
Springer
14 years 8 months ago
Key Attestation from Trusted Execution Environments
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...
99
Voted
KBSE
2007
IEEE
15 years 4 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
TRUST
2010
Springer
15 years 2 months ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
SOSP
2003
ACM
15 years 6 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...