enter search term and/or author name
Trusted paths for browsers
Zishuang (Eileen) Ye, Sean Smith, Denise Anthony
Computer security protocols usually terminate in a computer; however, the human-based services which they support usually terminate in a human. The gap between the human and the computer creates potential for security problems. We examine this gap,...
X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control
Rafae Bhatti, Arif Ghafoor, Elisa Bertino, James B. D. Joshi
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for efficient resource utilization, scalability, and flexibility. These environments are characterized by heterogeneous, distributed computing systems...
A pairwise key predistribution scheme for wireless sensor networks
Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent between sensor nodes. Before doing so, keys for performing encryption and authentication must be agreed upon by the communicating...