Sciweavers

3811 search results - page 17 / 763
» The Safe-Tcl Security Model
Sort
View
SISW
2003
IEEE
15 years 5 months ago
Information Security on the Logistical Network: An End-to-End Approach
We describe the information security aspects of logistical networking. The security model adopted by logistical networking is an end-to-end model that provides tunable security le...
Micah Beck, James S. Plank, Jeremy Millar, Scott A...
GRID
2005
Springer
15 years 5 months ago
Web services and grid security vulnerabilities and threats analysis and model
The paper provides an overview of available web applications and Web Services security vulnerability models and proposes a classification of the potential Grid and Web Services at...
Yuri Demchenko, Leon Gommans, Cees T. A. M. de Laa...
SACMAT
2009
ACM
15 years 6 months ago
Extending access control models with break-glass
Achim D. Brucker, Helmut Petritsch
ACISP
2008
Springer
15 years 6 months ago
Comparing the Pre- and Post-specified Peer Models for Key Agreement
In the pre-specified peer model for key agreement, it is assumed that a party knows the identifier of its intended communicating peer when it commences a protocol run. On the oth...
Alfred Menezes, Berkant Ustaoglu