• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 714
Next 10 →

Integrating SELinux with Security-typed Languages

by Boniface Hicks, Sandra Rueda, Trent Jaeger, Patrick Mcdaniel - ANNUAL SECURITY ENHANCED LINUX SYMPOSIUM , 2007
"... Traditionally, operating systems have enforced MAC and information flow policies with minimal dependence on application programs. However, there are many cases where systems depend on user-level programs to enforce information flows. Previous approaches to handling this problem, such as privilege-se ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
of our approach by constructing a prototype multi-level secure email client.

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
, and efficiency. We briefly describe our experiences with an international network of more than 30 nodes. We close with a list of open problems in anonymous communication. Overview Onion Routing is a distributed overlay network designed to anonymize TCP-based applications like web browsing, secure shell

Anonymous connections and onion routing

by Michael G. Reed, Paul F. Syverson, David M. Goldschlag - IEEE Journal on Selected Areas in Communications , 1998
"... Abstract—Onion routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing’s anonymous connections are bidirectional, near real-time, and can be used anywhere a s ..."
Abstract - Cited by 368 (18 self) - Add to MetaCart
to each onion router as well as to network observers. The same goes for data carried over the connections they establish. Proxy-aware applications, such as web browsers and e-mail clients, require no modification to use onion routing, and do so through a series of proxies. A prototype onion routing

Multi-Level Security Applications

by Justin Marston, Justin Marston
"... (MLS) end user applications that can span multiple networks at different classification levels. BlueSpace's middleware strategy facilitates rapid application development, infrastructure consolidation and infrastructure neutrality. The continuing growth in the number of networks in the defense a ..."
Abstract - Add to MetaCart
and intelligence communities has led to an increasing requirement for strategies that consolidate physical networks into logical networks running on consolidated infrastructure. This poster paper will survey Multi-Level Secure (MLS) applications that can be deployed on trusted desktops. MLS applications allow

A cost-effective, high-bandwidth storage architecture

by Garth A. Gibson, David F. Naglet, Khalil Amirit, Jeff Butler, Fay W. Chang, Howard Gobioff, Charles Hardint, Erik Riedelf, David Rochberg, Jim Zelenka - In Proceedings of the 8th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS , 1998
"... (NASD) storage architecture, prototype implementations oj NASD drives, array management for our architecture, and three,filesystems built on our prototype. NASD provides scal-able storage bandwidth without the cost of servers used primarily,fijr trut&rring data from peripheral networks (e.g. SCS ..."
Abstract - Cited by 197 (12 self) - Add to MetaCart
: direct transfer to clients, secure interfaces via cryptographic support, asynchronous non-critical-path oversight, and variably-sized data objects. Measurements of our prototype system show that these services can be cost-#ectively integrated into a next generation disk drive ASK. End-to-end measurements

Hail: A high-availability and integrity layer for cloud storage,” in

by Kevin D Bowers , Ari Juels , Alina Oprea - Proc. Of CCS’09, , 2009
"... ABSTRACT We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and retrievable. HAIL strengthens, formally unifies, and streamlines distinct approaches from the cryptographic and d ..."
Abstract - Cited by 195 (4 self) - Add to MetaCart
ABSTRACT We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and retrievable. HAIL strengthens, formally unifies, and streamlines distinct approaches from the cryptographic

SNAP: A protocol for negotiating service level agreements and coordinating resource management in distributed systems

by Karl Czajkowski, Ian Foster - In 8th Workshop on Job Scheduling Strategies for Parallel Processing , 2002
"... A fundamental problem with distributed applications is how to map activities such as computation or data transfer onto a set of resources that will meet the application’s requirement for performance, cost, security, or other quality of service metrics. An application or client must engage in a multi ..."
Abstract - Cited by 176 (12 self) - Add to MetaCart
A fundamental problem with distributed applications is how to map activities such as computation or data transfer onto a set of resources that will meet the application’s requirement for performance, cost, security, or other quality of service metrics. An application or client must engage in a

Practical Security in E-Mail Applications

by Franziskus Kiefer, Er Wiesmaier, Christian Fritz, Technische Universität Darmstadt
"... Abstract—This paper deals with practicability issues of encrypted e-mails. A quick survey on the status quo indicates that popular e-mail clients lack substantial practicability qualities, for example searching in encrypted e-mails. Other approaches such as De-Mail provide solutions, but offer trans ..."
Abstract - Add to MetaCart
Abstract—This paper deals with practicability issues of encrypted e-mails. A quick survey on the status quo indicates that popular e-mail clients lack substantial practicability qualities, for example searching in encrypted e-mails. Other approaches such as De-Mail provide solutions, but offer

A Secure Email Infrastructure for Computationally Weak Clients

by Robert Von Behren, Byunghoon Kang
"... Security in email systems involves computationally expensive public key cryptography operations. This makes it difficult to deploy secure email systems for computationally weak environments, such as personal digital assistants. To solve this problem, we have developed a secure framework in which com ..."
Abstract - Add to MetaCart
computationally weak clients can use a trusted server to perform difficult cryptographic operations on their behalf. As an added benefit, slight modifications to our scheme make it simple to add email security on top of older systems that do not support security.

Multi-channel, Multi-level Authentication for More Secure eBanking

by Mohamed Al-fairuz, Karen Renaud
"... Abstract—For decades, traditional authentication methods have proved weak in protecting users and organizations from various different online attacks. These include brute force password cracking, phishing, sniffing, active man-in-the-middle attacks, and session hijacking. The introduction of the one ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
with the level of security offered by multi-channel authentication. 66 % of them believed that it was easy to perform transactions. We found that most participants were not familiar with the vouching code (the fourth authentication factor proposed by RSA) implemented as part of the study. However, 69 % stated
Next 10 →
Results 1 - 10 of 714
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University