• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,464
Next 10 →

Distributed Directory: Security Enhancements

by Tik Ning Cheung, Jeannie Li, Henry Ng
"... The main objective of the project is to add security enhancements to the existing Distributed Directory. Distributed Directory is a decentralized listing of user’s contact information. Each entry is stored in each user’s web server as XML files, known as XML Profiles. The Security enhancements consi ..."
Abstract - Add to MetaCart
The main objective of the project is to add security enhancements to the existing Distributed Directory. Distributed Directory is a decentralized listing of user’s contact information. Each entry is stored in each user’s web server as XML files, known as XML Profiles. The Security enhancements

Security Enhanced MPEG Player

by Yongcheng Li, Zhigang Chen, See-mong Tan, Roy H. Campbell - In Proceedings of IEEE First International Workshop on Multimedia Software Development (MMSD'96 , 1996
"... Conventional cryptography deals with the encryption and decryption of traditional textual data. The advent of networked multimedia systems will make continuous media streams, such as real time audio and video, increasingly pervasive in future computing and communications environments. It is thus imp ..."
Abstract - Cited by 19 (0 self) - Add to MetaCart
important to secure networked continuous media from potential eavesdroppers. In this paper, we consider the process of real-time encryption and decryption for video streams. We implement a software-only security enhanced MPEG player. The security enhanced player implements a protection hierarchy

Security Enhanced MPEG Player

by Yongcheng Li Zhigang, Zhigang Chen, See-mong Tan, Roy H. Campbell - In Proceedings of IEEE First International Workshop on Multimedia Software Development (MMSD'96 , 1996
"... Conventional cryptography deals with the encryption and decryption of traditional textual data. The advent of networked multimedia systems will make continuous media streams, such as real time audio and video, increasingly pervasive in future computing and communications environments. It is thus imp ..."
Abstract - Add to MetaCart
important to secure networked continuous media from potential eavesdroppers. In this paper, we consider the process of real-time encryption and decryption for video streams. We implement a software-only security enhanced MPEG player. The security enhanced player implements a protection hierarchy

Modeling Security-Enhanced

by Myla Archer, Elizabeth Leonard, Matteo Pradella , 2003
"... Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server for enforcing policies defined in the language. To determine whether user requests to ..."
Abstract - Add to MetaCart
Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server for enforcing policies defined in the language. To determine whether user requests

End-To-End Arguments In System Design

by Jerome H. Saltzer, David P. Reed, David D. Clark , 1984
"... This paper presents a design principle that helps guide placement of functions among the modules of a distributed computer system. The principle, called the end-to-end argument, suggests that functions placed at low levels of a system may be redundant or of little value when compared with the cost o ..."
Abstract - Cited by 1037 (10 self) - Add to MetaCart
of providing them at that low level. Examples discussed in the paper include bit error recovery, security using encryption, duplicate message suppression, recovery from system crashes, and delivery acknowledgement. Low level mechanisms to support these functions are justified only as performance enhancements

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
, and efficiency. We briefly describe our experiences with an international network of more than 30 nodes. We close with a list of open problems in anonymous communication. Overview Onion Routing is a distributed overlay network designed to anonymize TCP-based applications like web browsing, secure shell

Policy analysis for security-enhanced Linux

by Beata Sarna-starosta, Scott D. Stoller - In Proceedings of the 2004 Workshop on Issues in the Theory of Security (WITS , 2004
"... Security-Enhanced Linux (SELinux) extends Linux with a flexible mandatory access control mechanism that enforces security policies expressed in SELinux’s policy language. Determining whether a given policy meets a site’s high-level security goals can be difficult, due to the low-level nature of the ..."
Abstract - Cited by 24 (0 self) - Add to MetaCart
Security-Enhanced Linux (SELinux) extends Linux with a flexible mandatory access control mechanism that enforces security policies expressed in SELinux’s policy language. Determining whether a given policy meets a site’s high-level security goals can be difficult, due to the low-level nature

AGAINST ATTACKS FOR SECURITY ENHANCEMENT

by V. Ramach
"... The Hyper Text Transfer Protocol (HTTP) protocol plays a vital role in Web Services Security. Though the HTTPs provide excellent security, they are not flexible enough to allow caches. HTTPi provides high integrity and low security whereas HTTPs provide low integrity and high security. The goal of W ..."
Abstract - Add to MetaCart
protection and agent protection. Due to mounting threats in the WS, numerous developers and researchers attempt to enhance additional safekeeping in service level. When WS usages are constantly increasing, it is necessary to give proper security as well as flexibility in WS. The requester agent sends

Security Enhancement: Combining Cryptography and

by Dhawal Seth, L. Ramanathan, Abhishek Pandey
"... In today’s world of high technology, it is not safe to share confidential and important data on any network. Intruders are always in wake of it. They hack the data and use it for their benefit. These malicious people try to gain benefit, get attention, or to harm someone. In either case, message sen ..."
Abstract - Add to MetaCart
sender or receiver has to pay the price. To avoid these undesirable acts, Steganography and cryptography are used together to ensure security of the covert and secure message. One of the most efficient and secure algorithms is Data Encryption Standard (DES). Steganography is the art and science

Security Enhancement for Enabling Dynamic . . .

by D. Ravikiran, et al. , 2014
"... In Cloud Computing, Storage as a Service is one of the most required services, but the security of the data stored in the cloud using these services is the key issue. The outsourced data in the cloud has to be guaranteed with confidentiality, integrity and access control. In this work, we device a ..."
Abstract - Add to MetaCart
In Cloud Computing, Storage as a Service is one of the most required services, but the security of the data stored in the cloud using these services is the key issue. The outsourced data in the cloud has to be guaranteed with confidentiality, integrity and access control. In this work, we device a
Next 10 →
Results 1 - 10 of 8,464
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University