Sciweavers

12637 search results - page 236 / 2528
» Security for Extensible Systems
Sort
View
146
Voted
SIGOPSE
2004
ACM
15 years 10 months ago
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
Michael Hohmuth, Michael Peter, Hermann Härti...
SDMW
2005
Springer
15 years 10 months ago
XML Security in the Next Generation Optical Disc Context
The Extensible Markup Language (XML) is considered as the de facto standard for information processing and exchange on the Internet and in the enterprise services domain. It is wid...
Gopakumar Nair, Ajeesh Gopalakrishnan, Sjouke Mauw...
147
Voted
AFRICACRYPT
2009
Springer
15 years 12 months ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...
Manuel Barbosa, Pooya Farshim
EKNOW
2010
14 years 12 months ago
Workshop-Based Risk Assessment for the Definition of Secure Business Processes
Nowadays, industry and governments are faced with an increasing number of varying threats concerning the security of their valuable business processes. Due to the vast damage pote...
Thomas Neubauer, Markus Pehn
NTMS
2008
IEEE
15 years 11 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran