نتایج جستجو برای: secure access control

تعداد نتایج: 1651441  

2005
Luis M. San-José-Revuelta

The paper studies the analogies and parallelism between the Bayesian approach for digital symbol sequences detection in communications problems and the techniques known as Multiple Hypotheses Tracking, which rely on fuzzy systems and inference. This comparison leads to the development of a SAM fuzzy recursive system which online estimates the performance of a blind Bayesian equalizer in a singl...

2010
Ning Shang Mohamed Nabeel Elisa Bertino Xukai Zou

Secure collaborative applications currently enabled by the Internet need flexible and efficient mechanisms for managing and distributing group keys. The secure transmission of information among collaborating users should be efficient as well as flexible in order to support access control models with different granularity levels for different kinds of applications such as secure group communicat...

Journal: :IACR Cryptology ePrint Archive 2012
Eduarda S. V. Freire Kenneth G. Paterson Bertram Poettering

Hierarchical Key Assignment Schemes can be used to enforce access control policies by cryptographic means. In this paper, we present a new, enhanced security model for such schemes. We also give simple, efficient, and strongly-secure constructions for Hierarchical Key Assignment Schemes for arbitrary hierarchies using pseudorandom functions and forwardsecure pseudorandom generators. We compare ...

2002
Algis Rudys Dan S. Wallach

Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of techniques exist for managing access control to system services and even for terminating codelets once they’ve been determined to be misbehaving. However, because codelets can be terminated anywhere in their execution, a co...

2015
Neetesh Saxena Bong Jun Choi

The smart grid (SG) is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications...

2004
Ayan Roy Chowdhury John S. Baras

This paper proposes a design for key management for secure multicast in hybrid satellite networks. Communication satellites offer an efficient way to extend IP multicast services for groups in wide-area networks. In order to be commercially viable, the multicast traffic should be accessible only to paying subscribers. Access control can be achieved by data encryption. This requires secure and e...

2003
SuGil Choi Kwangjo Kim

Mobile IP enables a mobile node (MN) to move around without losing their transport-layer connectivity by using resources in a foreign domain network. Mobile IP (MIP) is expected to be the core infrastructure of future mobile communication, but two services must be provided before the wide deployment of MIP. One is to provide secure communication and the other is to make payment. Security servic...

2003
Shoichi Sakane Nobuo Okabe Kenichi Kamada Hiroshi Esaki

When IPv6 deploys, each information appliance shall have a global IP address and communicates directly with each other. Some devices may have much lower processing performance than PCs have due to various limitations (e.g. cost, physical size, power consumption). Such devices must have security function, that is confidentiality, integrity and access control, for provision of privacy even with a...

2004
Martín Abadi Ted Wobber

As its name indicates, NGSCB aims to be the “Next-Generation Secure Computing Base”. As envisioned in the context of Trusted Computing initiatives, NGSCB provides protection against software attacks. This paper describes NGSCB using a logic for authentication and access control. Its goal is to document and explain the principals and primary APIs employed in NGSCB.

2007
Shudong Chen Igor Radovanovic Johan J. Lukkien Richard Verhoeven Melissa Tjiong Remi Bosman

The Freeband I-Share project aims to define the mechanisms for trust, willingness, resource discovery and sharing mechanisms in virtual communities. To improve the secure and performance of a 3D video streaming application, which is a research vehicle of the I-Share project, we propose a virtual community based access control approach for secure service discovery and access (VICSDA) which group...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید