Zobrazeno 71 - 80
of 186
pro vyhledávání: '"Andrew S. Tanenbaum"'
Publikováno v:
Rieback, M R, Simpson, P N D, Crispo, B & Tanenbaum, A S 2006, ' RFID Malware: Design Principles and Examples ', Pervasive and Mobile Computing, vol. 2, no. 4, pp. 405-426 . https://doi.org/10.1016/j.pmcj.2006.07.008
Pervasive and Mobile Computing, 2(4), 405-426. Elsevier
Pervasive and Mobile Computing, 2(4), 405-426. Elsevier
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems - including RFID exploits, RFID worms, and RFID viruses. We present RFID malware design principles together with concrete examples; the highlight is a fully
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f8c50b079cecf876c4ce96dfbc69292b
https://research.vu.nl/en/publications/4ed15f3e-e724-4bb8-8aa9-804a2157661d
https://research.vu.nl/en/publications/4ed15f3e-e724-4bb8-8aa9-804a2157661d
Publikováno v:
Tanenbaum, A S, Gamage, C D & Crispo, B 2006, ' Taking Sensor Networks from the Lab to the Jungle ', Computer, vol. 39, no. 8, pp. 98-100 . https://doi.org/10.1109/MC.2006.280
Computer, 39(8), 98-100. IEEE
Computer, 39(8), 98-100. IEEE
Sensor networks pose unique technical and logistical challenges. One of the most widely cited applications for sensor networks is monitoring national borders for humans attempting to surreptitiously cross on foot, especially at night. Other suggested
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4f2680d67eb1068c5a6e89360c2171a1
https://hdl.handle.net/1871.1/76473dc1-f3ac-4763-9452-c42386c8ceef
https://hdl.handle.net/1871.1/76473dc1-f3ac-4763-9452-c42386c8ceef
Publikováno v:
Gamage, C D, Bicakci, K, Crispo, B & Tanenbaum, A S 2006, Security for the Mythical Air-Dropped Sensor Network . in Proceedings-11th IEEE Symposium on Computers and Communications, ISCC 2006 ., 1691005, pp. 41-47, 11th IEEE Symposium on Computers and Communications, ISCC 2006, Cagliari, Sardinia, Italy, 26/06/06 . https://doi.org/10.1109/ISCC.2006.143
Proceedings-11th IEEE Symposium on Computers and Communications, ISCC 2006, 41-47
STARTPAGE=41;ENDPAGE=47;TITLE=Proceedings-11th IEEE Symposium on Computers and Communications, ISCC 2006
ISCC
Proceedings-11th IEEE Symposium on Computers and Communications, ISCC 2006, 41-47
STARTPAGE=41;ENDPAGE=47;TITLE=Proceedings-11th IEEE Symposium on Computers and Communications, ISCC 2006
ISCC
The research area of very large scale wireless sensor networks made of low-cost sensors is gaining a lot of interest as witnessed by the large number of published papers. The security aspects of such networks are addressed as well, and in particular
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fa8808a3f355075122f6ff0934cf6312
https://hdl.handle.net/1871.1/d2be2c6f-b2ae-4c88-a5a5-255496178f71
https://hdl.handle.net/1871.1/d2be2c6f-b2ae-4c88-a5a5-255496178f71
Publikováno v:
Rieback, M R, Crispo, B & Tanenbaum, A S 2006, Is Your Cat Infected with a Computer Virus? in Proceedings-Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006 . vol. 2006, 1604806, Institute of Electrical and Electronics Engineers, Inc., pp. 169-179, 4th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006, Pisa, Italy, 13/03/06 . https://doi.org/10.1109/PERCOM.2006.32
Proceedings-Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006, 2006, 169-179
PerCom
Proceedings-Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006, 2006, 169-179
PerCom
RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as properly formatted but fake RFID data; however no one expects an RFID tag t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e739412b0173f2b22f1623be9137db08
https://hdl.handle.net/1871.1/3914bc46-8c67-4369-8c92-08c3dc9e5cf7
https://hdl.handle.net/1871.1/3914bc46-8c67-4369-8c92-08c3dc9e5cf7
Publikováno v:
Bakker, A, van Steen, M R & Tanenbaum, A S 2006, ' A Wide-Area Distribution Network for Free Software ', ACM Transactions on Internet Technology, vol. 6, no. 3 . https://doi.org/10.1145/1151087.1151089
ACM Transactions on Internet Technology, 6(3). Association for Computing Machinery (ACM)
ACM Transactions on Internet Technology, 6(3). Association for Computing Machinery (ACM)
The Globe Distribution Network (GDN) is an application for the efficient, worldwide distribution of freely redistributable software packages. Distribution is made efficient by encapsulating the software into special distributed objects which efficien
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4a3f8fc8cd2250688a0a5e174e358c4b
https://research.vu.nl/en/publications/91d9c26c-ee68-4280-83f2-63aed9b165e8
https://research.vu.nl/en/publications/91d9c26c-ee68-4280-83f2-63aed9b165e8
Publikováno v:
Herder, J N, Bos, H J, Gras, B, Homburg, P C & Tanenbaum, A S 2006, Construction of a Highly Dependable Operating System . in Proc. of EDCC'06 . Coimbra. Portugal . https://doi.org/10.1109/EDCC.2006.7
Proc. of EDCC'06
EDCC
Proc. of EDCC'06
EDCC
It has been well established that most operating system crashes are due to bugs in device drivers. Because drivers are normally linked into the kernel address space, a buggy driver can wipe out kernel tables and bring the system crashing to a grindin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4e04297d0f351407087501f3cfb5597f
https://hdl.handle.net/1871.1/3a98f538-5f10-4346-8bdc-9514345e43af
https://hdl.handle.net/1871.1/3a98f538-5f10-4346-8bdc-9514345e43af
Publikováno v:
SecureComm
2006 Securecomm and Workshops, 1-5
STARTPAGE=1;ENDPAGE=5;TITLE=2006 Securecomm and Workshops
Gamage, C D, Gras, B J, Crispo, B & Tanenbaum, A S 2006, An Identity-Based Ring Signature Scheme with Enhanced Privacy . in 2006 Securecomm and Workshops ., 4198814, pp. 1-5, 2006 Securecomm and Workshops, Baltimore, Maryland, United States, 28/08/06 . https://doi.org/10.1109/SECCOMW.2006.359554
2006 Securecomm and Workshops, 1-5
STARTPAGE=1;ENDPAGE=5;TITLE=2006 Securecomm and Workshops
Gamage, C D, Gras, B J, Crispo, B & Tanenbaum, A S 2006, An Identity-Based Ring Signature Scheme with Enhanced Privacy . in 2006 Securecomm and Workshops ., 4198814, pp. 1-5, 2006 Securecomm and Workshops, Baltimore, Maryland, United States, 28/08/06 . https://doi.org/10.1109/SECCOMW.2006.359554
There are many applications in which it is necessary to transmit authenticatable messages while achieving certain privacy goals such as signer ambiguity. The emerging area of vehicular ad-hoc network is a good example application domain with this req
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::047ba0261c6727d63b6836ebb6689c00
http://www.scopus.com/inward/record.url?scp=50049120617&partnerID=8YFLogxK
http://www.scopus.com/inward/record.url?scp=50049120617&partnerID=8YFLogxK
Autor:
Andrew S. Tanenbaum
Publikováno v:
Proceedings of the twentieth ACM symposium on Operating systems principles.
How to Incorporate Revocation Status Information into the Trust Metrics for Public-Key Certification
Publikováno v:
Applied Computing 2005-Proceedings of the 20th Annual ACM Symposium on Applied Computing, 2, 1594-1598
SAC
Bicakci, K, Crispo, B & Tanenbaum, A S 2005, How to Incorporate Revocation Status Information into the Trust Metrics for Public-Key Certification . in Applied Computing 2005-Proceedings of the 20th Annual ACM Symposium on Applied Computing . vol. 2, pp. 1594-1598, 20th Annual ACM Symposium on Applied Computing, Santa Fe, New Mexico, United States, 13/03/05 . https://doi.org/10.1145/1066677.1067037
SAC
Bicakci, K, Crispo, B & Tanenbaum, A S 2005, How to Incorporate Revocation Status Information into the Trust Metrics for Public-Key Certification . in Applied Computing 2005-Proceedings of the 20th Annual ACM Symposium on Applied Computing . vol. 2, pp. 1594-1598, 20th Annual ACM Symposium on Applied Computing, Santa Fe, New Mexico, United States, 13/03/05 . https://doi.org/10.1145/1066677.1067037
In a traditional PKI, the trust associated with a public key is expressed in binary either by 0 or 1. Alternatively, several authors have proposed trust metrics to evaluate the confidence afforded by a public key. However their work has a static poin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3c1002ebfd218d2edfdbb8b244f4e209
https://research.vu.nl/en/publications/ede8c593-7ed5-420a-8801-830de55fd686
https://research.vu.nl/en/publications/ede8c593-7ed5-420a-8801-830de55fd686
Publikováno v:
Security Protocols ISBN: 9783540283898
Security Protocols Workshop
Security Protocols Workshop
In this paper we present the design and the implementation of a policy engine for enforcing security policies for distributed applications. Such policies, represented by using the RBAC model, include both how the distributed, shared and replicated ob
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3fb27b9d2079aa72665ac4d941e67cf2
https://doi.org/10.1007/11542322_16
https://doi.org/10.1007/11542322_16