Sciweavers

2429 search results - page 210 / 486
» Using Aspects to Design a Secure System
Sort
View
117
Voted
IEEEARES
2010
IEEE
15 years 10 months ago
Secure Monitoring of Service Level Agreements
—Service Level Agreements (SLA) are commonly used to define terms and conditions of service provisioning. WS-Agreement1 is an SLA specification that addresses the need of both ...
K. P. Clark, Martijn Warnier, Frances M. T. Brazie...
122
Voted
CSFW
2008
IEEE
15 years 10 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
116
Voted
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
15 years 7 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
118
Voted
ADL
1999
Springer
107views Digital Library» more  ADL 1999»
15 years 7 months ago
Extending the Role of Metadata in a Digital Library System
We describe an approach to the development of a digital library system that is founded on a number of basic principles. In particular, we discuss the critical role of metadata in ...
Alexa T. McCray, Marie E. Gallagher, Michael A. Fl...
CCR
2007
108views more  CCR 2007»
15 years 3 months ago
Very low-cost internet access using KioskNet
Rural Internet kiosks in developing regions can cost-effectively provide communication and e-governance services to the poorest sections of society. A variety of technical and no...
Shimin Guo, Mohammad Hossein Falaki, Earl A. Olive...