Sciweavers

2429 search results - page 235 / 486
» Using Aspects to Design a Secure System
Sort
View
CCS
2008
ACM
15 years 5 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
152
Voted
APSEC
2001
IEEE
15 years 7 months ago
Formal Specification of Mixed Components with Korrigan
Formal specifications are now widely accepted in software development. Recently, the need for a separation of concerns with reference to static and dynamic aspects appeared. Furth...
Christine Choppy, Pascal Poizat, Jean-Claude Royer
145
Voted
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
15 years 9 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
115
Voted
SACMAT
2003
ACM
15 years 8 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
140
Voted
TRUST
2009
Springer
15 years 10 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi