Sciweavers

7 search results - page 1 / 2
» compsec 2002
Sort
View
COMPSEC
2002
45views more  COMPSEC 2002»
15 years 4 days ago
Differentially secure multicasting and its implementation methods
S. Holeman, G. Manimaran, James Davis, Anirban Cha...
89
Voted
COMPSEC
2002
134views more  COMPSEC 2002»
15 years 4 days ago
The Open Source approach opportunities and limitations with respect to security and privacy
Today
Marit Hansen, Kristian Köhntopp, Andreas Pfit...
COMPSEC
2002
92views more  COMPSEC 2002»
15 years 4 days ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong