Sciweavers

3811 search results - page 52 / 763
» The Safe-Tcl Security Model
Sort
View
IPPS
2007
IEEE
15 years 6 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
ISW
2007
Springer
15 years 6 months ago
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
Abstract. The concept of timed-released encryption with pre-open capability (TRE-PC) was introduced by Hwang, Yum and Lee. In a TREPC scheme, a message is encrypted in such a way t...
Alexander W. Dent, Qiang Tang
KBSE
2005
IEEE
15 years 5 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
ACSD
2003
IEEE
125views Hardware» more  ACSD 2003»
15 years 5 months ago
Modelling a Secure, Mobile, and Transactional System with CO-OPN
Modelling complex concurrent systems is often difficult and error-prone, in particular when new concepts coming from advanced practical applications are considered. These new appl...
Didier Buchs, Stanislav Chachkov, David Hurzeler
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
16 years 5 hour ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...