Sciweavers

18094 search results - page 53 / 3619
» The Architecture of Secure Systems
Sort
View
ACSAC
2000
IEEE
15 years 3 months ago
Security Architectures for Controlled Digital Information Dissemination
Jaehong Park, Ravi S. Sandhu, J. Schifalacqua
ISI
2008
Springer
14 years 11 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
SACMAT
2010
ACM
14 years 9 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
CCS
2007
ACM
15 years 5 months ago
An independent audit framework for software dependent voting systems
The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. O...
Sujata Garera, Aviel D. Rubin
RTCSA
2005
IEEE
15 years 4 months ago
FPGA-Based Content Protection System for Embedded Consumer Electronics
We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Hiroyuki Yokoyama, Kenji Toda