Sciweavers

2429 search results - page 203 / 486
» Using Aspects to Design a Secure System
Sort
View
113
Voted
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 7 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
ETFA
2006
IEEE
15 years 9 months ago
Implementation of an Internet-controlled system under variable delays
Abstract— This work deals with the control and the observation of a remote system using Internet as a communication line. The process consists in a Slave part S, with poor comput...
Alexandre Seuret, M. Termens-Ballester, A. Toguyen...
152
Voted
HICSS
1999
IEEE
133views Biometrics» more  HICSS 1999»
15 years 7 months ago
Collaborative Decision Making and Intelligent Reasoning in Judge Advisor Systems
This paper presents a judgement and decision making analysis of collaborative problem solving. This analysis is done with respect to the Raven and CoRaven decision-making tools fo...
David C. Wilkins, Patricia M. Jones, Roger Bargar,...
PLDI
2005
ACM
15 years 9 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
123
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...