Results 1 - 10
of
9,195
Network Externalities and the Deployment of Security Features
- and Protocols in the Internet. ACM SIGMETRICS 08
"... Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular economic reasons arising from the presence of network externalities. Indeed, like the Internet itself, the technologies to ..."
Abstract
-
Cited by 42 (10 self)
- Add to MetaCart
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular economic reasons arising from the presence of network externalities. Indeed, like the Internet itself, the technologies
Decentralized Trust Management
- In Proceedings of the 1996 IEEE Symposium on Security and Privacy
, 1996
"... We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, an ..."
Abstract
-
Cited by 1025 (24 self)
- Add to MetaCart
approach to trust management, based on a simple language for specifying trusted actions and trust relationships. It also describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services
• Robust security features
"... Data Warehousing Tools are used by large and complex applications in this millennium. Some companies use Data Warehousing Tools as a core competency, making their applications effective in bringing value to the end consumer. Other companies ’ use it merely as a presence with little value added. We h ..."
Abstract
- Add to MetaCart
have used Data Warehousing for some leading business houses and fortune 200 companies. The paper summarizes a case study where we could come out with tremendous improvement in performance. For the sake of security and “Non Disclosure Act ” we will not use the name of the company in this paper.
An Overview of Electronic Passport Security Features
"... Abstract. Electronic passports include contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution. In its simplest form an electronic passport contains just a collection of read-only files, more advanced variants can include sophis ..."
Abstract
- Add to MetaCart
sophisticated cryptographic mechanisms protecting security of the document and / or privacy of the passport holder. This paper describes security features of electronic passports and discusses their efficiency.
Modelling MAS-Specific Security Features
"... Abstract. In this paper, we pursue a modelling approach to address security requirements for multi-agent systems (MAS). This will allow developers to account for both the system and agent-specific security requirements of a MAS during the requirements phase and throughout the whole Software Developm ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
recently proposed MAS metamodel. Keywords: Meta-modelling, modelling of Agent-Oriented Information Systems, modelling of security features, the act of modelling,
Tor: The secondgeneration onion router,”
- in 13th USENIX Security Symposium. Usenix,
, 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract
-
Cited by 1229 (33 self)
- Add to MetaCart
, and efficiency. We briefly describe our experiences with an international network of more than 30 nodes. We close with a list of open problems in anonymous communication. Overview Onion Routing is a distributed overlay network designed to anonymize TCP-based applications like web browsing, secure shell
Expanding and Extending the Security Features of Java
- In Proceedings of the 7th USENIX Security Symposium
, 1998
"... ..."
Specifying Selected Security Features of Inter-Organizational Workflows
"... Workflow security introduces a shift from traditional subjectobject-rights focus of database to a transaction oriented one. Heterogeneity and internet-based technology are prevalent in interorganizational collaborative computing environments. Interorganizational workflow provides solution for data s ..."
Abstract
- Add to MetaCart
sharing and work coordination at a global level. A secure computing infrastructure is needed to support their missions. Security features are incorporated for each participating organization as well as for the overall interorganizational workflow. Security features such as authentication and non
Bluetooth Wireless Networks Security Features
"... This paper will explore the security elements of the Bluetooth open standard conceived by Ericsson, Inc., and supported by an alliance of major information technology manufacturers including IBM, Nokia, Motorola, Intel, and others. Bluetooth’s security in the areas of encryption, authentication, and ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
This paper will explore the security elements of the Bluetooth open standard conceived by Ericsson, Inc., and supported by an alliance of major information technology manufacturers including IBM, Nokia, Motorola, Intel, and others. Bluetooth’s security in the areas of encryption, authentication
Results 1 - 10
of
9,195