Sciweavers

18094 search results - page 116 / 3619
» The Architecture of Secure Systems
Sort
View
SIGECOM
2005
ACM
113views ECommerce» more  SIGECOM 2005»
15 years 5 months ago
Dynamic and secure B2B e-contract update management
Business-to-business electronic contracts provide a specification of the agreed value exchange and guarantee legal protection to companies during electronic trading relations. Imp...
Samuil Angelov, Sven Till, Paul W. P. J. Grefen
HOTOS
2003
IEEE
15 years 5 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
ICCS
2001
Springer
15 years 4 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
DRM
2008
Springer
15 years 1 months ago
A four-layer model for security of digital rights management
Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This co...
Eric Diehl
DBSEC
2011
245views Database» more  DBSEC 2011»
14 years 3 months ago
Multilevel Secure Data Stream Processing
Abstract. With sensors and mobile devices becoming ubiquitous, situation monitoring applications are becoming a reality. Data Stream Management Systems (DSMSs) have been proposed t...
Raman Adaikkalavan, Indrakshi Ray, Xing Xie