Deploying security services is hard. security services are more readily integrated when they can be added at a single point in a network or at a single layer in the protocol stack. Most of today’s widely deployed sec...
详细信息
the development of extranets is transforming enterprise networking. Rather than using proprietary networks to exchange private information, organisations can now set up corporate extranets to exchange data and share a...
详细信息
D.D.C. Brewer and M.J. Nash (IEEE Symposium on security and privacy, pp. 206-14, 1988) introduced Chinese Wall security policy models for commercial security. these were later updated by T.Y. Lin (Proc. 5th Aerospace ...
详细信息
D.D.C. Brewer and M.J. Nash (IEEE Symposium on security and privacy, pp. 206-14, 1988) introduced Chinese Wall security policy models for commercial security. these were later updated by T.Y. Lin (Proc. 5th Aerospace Comput. security Appl. Conf., pp. 286-93, 1989). Applying Z. Pawlak's (1997) idea of conflict analysis, this paper introduces a practical way of computing an extended model.
the proceedings contain 24 papers. the special focus in this conference is on Research in Computer security. the topics include: Fixed vs. variable-length patterns for detecting suspicious process behavior;a tool for ...
ISBN:
(纸本)3540650040
the proceedings contain 24 papers. the special focus in this conference is on Research in Computer security. the topics include: Fixed vs. variable-length patterns for detecting suspicious process behavior;a tool for pro-active defense against the buffer overrun attack;a kernelized architecture for multilevel secure application policies;dealing with multi-policy security in large open distributed systems;a flexible method for information system security policy specification;on the security of some variants of the RSA signature scheme;side channel cryptanalysis of product ciphers;on the security of digital tachographs;an authorization model and its formal semantics;authorization in corba security;rules for designing multilevel object-oriented databases;byte code verification for java smart cards based on model checking;towards formalizing the java security architecture of JDK 1.2;trusted third party services for securing medical java applets;cheap detection of embedded copyright data in DVD-video;a scheme for managing watermarking keys in the aquarelle multimedia distributed system;authentication and payment in future mobile systems;a new approach for protecting location information in mobile communication networks;a mix-mediated anonymity service and its payment;a subjective metric of authentication;a sound logic for analysing electronic commerce protocols and inductive analysis of the secrecy goals .
the RSA algorithm is a major method in implementing a public key cryptosystem. On the basis that the Montgomery algorithm can modular-multiply in a fast way, this paper presents a hardware implementation of a 1024-bit...
详细信息
the RSA algorithm is a major method in implementing a public key cryptosystem. On the basis that the Montgomery algorithm can modular-multiply in a fast way, this paper presents a hardware implementation of a 1024-bit RSA cryptoprocessor. It has been shown that the processor can encrypt 1024 bit message in less than 0.65 seconds, with which a 3 mm/sup 2/ die area. It is suitable for smart IC cards.
the paper presents a model of a secure collaborative application for conducting real-time electronic meetings from remote locations. the application consists of a set of tools, enabling common meeting tasks to be acco...
详细信息
the paper presents a model of a secure collaborative application for conducting real-time electronic meetings from remote locations. the application consists of a set of tools, enabling common meeting tasks to be accomplished. the tools can be enhanced withsecurity services at will. the security architecture comprises the standardized communication security services as well as the "group oriented" security services which we defined earlier. Such security architecture is especially suitable for enterprises with a defined internal organizational policy, which has to be supported and enforced by adequate security mechanisms.
Computer-Supported Cooperative Work (CSCW) requires coordinated access to shared information over computer networks;such networks have tended to use wires, but wireless networks are now becoming common. there are a la...
详细信息
applications involving cooperation between several users are often expressed in terms of operations on shared objects. the challenge is to provide adequate access to shared objects for cooperating principals while mai...
ISBN:
(纸本)9781450373388
applications involving cooperation between several users are often expressed in terms of operations on shared objects. the challenge is to provide adequate access to shared objects for cooperating principals while maintaining the required level of integrity and privacy for objects. We assume an open system environment populated with distributed and potentially shareable and persistent objects. security mechanisms should be independent of application programs, ensuring the security of data objects regardless of the programs that are used to access them. In general, we need the ability to control access at the level of each of the operations of an *** present a security model that reflects the structure of cooperative work, enabling users' security policies and other task requirements to be translated directly into access rights for those shared objects whose protection must be guaranteed for the successful outcome of cooperative tasks. Our model is derived from a study of some cooperative tasks in the real world [5]. the model is based on notions of group tasks, organisational roles and delegation. We consider briefly the implications of our security model for operating system design in the context of a shared object system based on a distributed shared memory model [1].
A data encryption processor and its responsiveness to the growing needs of the marketplace are described. Information integrity and datasecurity are growing concerns in every environment. the VM007 supports these nee...
详细信息
暂无评论