• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 9,195
Next 10 →

Network Externalities and the Deployment of Security Features

by Marc Lelarge - and Protocols in the Internet. ACM SIGMETRICS 08
"... Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular economic reasons arising from the presence of network externalities. Indeed, like the Internet itself, the technologies to ..."
Abstract - Cited by 42 (10 self) - Add to MetaCart
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular economic reasons arising from the presence of network externalities. Indeed, like the Internet itself, the technologies

Decentralized Trust Management

by Matt Blaze, Joan Feigenbaum, Jack Lacy - In Proceedings of the 1996 IEEE Symposium on Security and Privacy , 1996
"... We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, an ..."
Abstract - Cited by 1025 (24 self) - Add to MetaCart
approach to trust management, based on a simple language for specifying trusted actions and trust relationships. It also describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services

• Robust security features

by Ashiss Kumar Dash, Rakesh Agarwal, Near Planetarium, Service Offered Ra/design/development/implementation/warranty, Admin Features
"... Data Warehousing Tools are used by large and complex applications in this millennium. Some companies use Data Warehousing Tools as a core competency, making their applications effective in bringing value to the end consumer. Other companies ’ use it merely as a presence with little value added. We h ..."
Abstract - Add to MetaCart
have used Data Warehousing for some leading business houses and fortune 200 companies. The paper summarizes a case study where we could come out with tremendous improvement in performance. For the sake of security and “Non Disclosure Act ” we will not use the name of the company in this paper.

An Overview of Electronic Passport Security Features

by Zdeněk Říha
"... Abstract. Electronic passports include contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution. In its simplest form an electronic passport contains just a collection of read-only files, more advanced variants can include sophis ..."
Abstract - Add to MetaCart
sophisticated cryptographic mechanisms protecting security of the document and / or privacy of the passport holder. This paper describes security features of electronic passports and discusses their efficiency.

Modelling MAS-Specific Security Features

by G. Beydoun, G. Low, H. Mouratidis, B. Henderson-sellers
"... Abstract. In this paper, we pursue a modelling approach to address security requirements for multi-agent systems (MAS). This will allow developers to account for both the system and agent-specific security requirements of a MAS during the requirements phase and throughout the whole Software Developm ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
recently proposed MAS metamodel. Keywords: Meta-modelling, modelling of Agent-Oriented Information Systems, modelling of security features, the act of modelling,

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
, and efficiency. We briefly describe our experiences with an international network of more than 30 nodes. We close with a list of open problems in anonymous communication. Overview Onion Routing is a distributed overlay network designed to anonymize TCP-based applications like web browsing, secure shell

Expanding and Extending the Security Features of Java

by Nimisha V. Mehta, Karen R. Sollins - In Proceedings of the 7th USENIX Security Symposium , 1998
"... ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
Abstract not found

Specifying Selected Security Features of Inter-Organizational Workflows

by Boleslaw Mikolajczak, Sachin Joshi
"... Workflow security introduces a shift from traditional subjectobject-rights focus of database to a transaction oriented one. Heterogeneity and internet-based technology are prevalent in interorganizational collaborative computing environments. Interorganizational workflow provides solution for data s ..."
Abstract - Add to MetaCart
sharing and work coordination at a global level. A secure computing infrastructure is needed to support their missions. Security features are incorporated for each participating organization as well as for the overall interorganizational workflow. Security features such as authentication and non

Bluetooth Wireless Networks Security Features

by Gregory Lamm, O Falauto, Jorge Estrada, Jag Gadiyaram
"... This paper will explore the security elements of the Bluetooth open standard conceived by Ericsson, Inc., and supported by an alliance of major information technology manufacturers including IBM, Nokia, Motorola, Intel, and others. Bluetooth’s security in the areas of encryption, authentication, and ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
This paper will explore the security elements of the Bluetooth open standard conceived by Ericsson, Inc., and supported by an alliance of major information technology manufacturers including IBM, Nokia, Motorola, Intel, and others. Bluetooth’s security in the areas of encryption, authentication

SECURITY FEATURES OFFERED BY GSM......................................................................................... 2

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 9,195
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University