Sciweavers

1770 search results - page 167 / 354
» Writing requirements in computer security
Sort
View
CORR
2010
Springer
89views Education» more  CORR 2010»
14 years 10 months ago
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
SACMAT
2009
ACM
15 years 4 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
CCS
2009
ACM
15 years 5 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
NOSSDAV
2009
Springer
15 years 4 months ago
Probabilistic event resolution with the pairwise random protocol
Peer-to-peer distributed virtual environments (DVE's) distribute state tracking and state transitions. Many DVE's - such as online games - require ways to fairly determi...
John L. Miller, Jon Crowcroft
ESCIENCE
2005
IEEE
15 years 3 months ago
GAMA: Grid Account Management Architecture
Security is a critical component of grid systems and while there are numerous software components and tools that provide some capabilities relating to security, there are few comp...
Karan Bhatia, Sandeep Chandra, Kurt Mueller