Physical security devices for computer subsystems: A survey of attacks and defenses

SH Weingart - … Workshop on Cryptographic Hardware and Embedded …, 2000 - Springer
As the value of data on computing systems increases and operating systems become more
secure, physical attacks on computing systems to steal or modify assets become more likely …

[图书][B] The digital dilemma: Intellectual property in the information age

National Research Council… - 2000 - books.google.com
Imagine sending a magazine article to 10 friends-making photocopies, putting them in
envelopes, adding postage, and mailing them. Now consider how much easier it is to send …

Establishing business rules for inter-enterprise electronic commerce

V Ungureanu, NH Minsky - International Symposium on Distributed …, 2000 - Springer
Conventional mechanisms for electronic commerce provide strong means for securing
transfer of funds, and for ensuring such things as authenticity and non-repudiation. But they …

Secure coprocessor integration with Kerberos V5

N Itoi - 9th USENIX Security Symposium (USENIX Security 00), 2000 - usenix.org
The nightmare of Trusted Third Party (T3P) based protocol users is compromise of the T3P.
Because the compromised T3P can read and modify any user information, the entire user …

[PDF][PDF] Mobile agents and telcos' nightmares

J Posegga, G Karjoth - Annales des télécommunications, 2000 - academia.edu
The paper analyses the current state-of-the-art of mobile agents technology wrt security,
seen from the standpoint of a public network operator (PNO). It is argued that the current …

[PDF][PDF] WebALPS: Using Trusted Co-Servers to Enhance Privacy and Security of Web Interactions

SW Smith - Research Report, 2000 - Citeseer
This report describes a project that aims to fill two gaps in recent security and privacy
research. The first gap is trust. Too often,“security of Web transactions” reduces to …

History based distributed filtering-a tagging approach to network-level access control

R Sailer, M Kabatnik - Proceedings 16th Annual Computer …, 2000 - ieeexplore.ieee.org
Discusses a network-level access control technique that applies the non-discretionary
access control model to individual data packets that are exchanged between hosts or …

[图书][B] Improving DES Hardware Throughput for Short Operations

M Lindemann, SW Smith - 2000 - Citeseer
IBM Research Report Page 1 RC 21798 Log 98050 07 31 2000 Computer Science
Mathematics IBM Research Report Improving DES Hardware Throughput for Short Operations …

[图书][B] The use of safe areas of computation (SAC) for secure computing

ALM Dos Santos - 2000 - search.proquest.com
Currently the computer systems and software used by the average user offer virtually no
security. Because of this many attacks, both simulated and real, have been described by the …

[PDF][PDF] Practical Private Information Retrieval with Secure Coprocessors

AABDH TJ, WT Zurich - Citeseer
What does it take to implement a server that provides access to records in a large database,
in a way that ensures that the this access is completely private—even to the operator of this …