Sciweavers

706 search results - page 77 / 142
» Trust management for IPsec
Sort
View
IFIP
2005
Springer
15 years 5 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
COMCOM
2008
104views more  COMCOM 2008»
14 years 11 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
SISW
2005
IEEE
15 years 5 months ago
File System Design with Assured Delete
This paper describes a system that supports high availability of data, until the data should be expunged, at which time it is impossible to recover the data. This design supports ...
Radia J. Perlman
JIKM
2002
104views more  JIKM 2002»
14 years 11 months ago
Implementing KM in an Information Technology Environment: a Practical Approach
The emergence of knowledge-based organisations has seen an emphasis shift to recognising people as the prime competitive asset and the push of management to nurture social capital...
Jayakrishnan Balachandran, Schubert Foo
SIGUCCS
1999
ACM
15 years 4 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry