Sciweavers

902 search results - page 53 / 181
» Security and Trust Requirements Engineering
Sort
View
CCS
2009
ACM
15 years 4 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
72
Voted
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
15 years 4 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
TRUST
2010
Springer
15 years 2 months ago
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the devic...
Ernie Brickell, Jiangtao Li
MASS
2010
118views Communications» more  MASS 2010»
14 years 7 months ago
Implementation and evaluation of distance-based message authentication
A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message t...
Antony Chung, Utz Roedig
COMPUTER
2004
120views more  COMPUTER 2004»
14 years 9 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson