Sean Smith

Results: 101



#Item
21Medical informatics / Access control / OpenEMR / Medical terms / United States Department of Veterans Affairs / Capability-based security / Belaying / Patient safety / VistA / Health / Medicine / Health informatics

Capability Exchange: Improving Access Control Usability in Health IT Chen Qin, Emily Freebairn, Sean Smith Department of Computer Science Dartmouth College July 18, 2013

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2013-09-11 09:13:33
22Trusted computing / Chain of trust / Kernel / Vulnerability / X Window System / DTrace / Field-programmable gate array / Ring / Trusted computing base / Computer security / Software / Computing

New Directions for Hardware-assisted Trusted Computing Policies (Position Paper) Sergey Bratus · Michael E. Locasto · Ashwin Ramaswamy · Sean W. Smith Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 10:16:33
23Security / Crime prevention / Data security / Information security / National security / Network security / Routing / Cisco IOS / Data mining / Computing / Network architecture / Computer security

Using Hierarchal Change Mining to Manage Network Security Policy Evolution Gabriel A. Weaver, Nick Foti, Sergey Bratus, Dan Rockmore, Sean W. Smith Deparment of Computer Science Dartmouth College, Hanover, New Hampshire

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-04-01 14:57:36
24Certificate policy / X.509 / Public key infrastructure / Public key certificate / Certificate authority / Cryptography / Public-key cryptography / Key management

A Computational Framework for Certificate Policy Operations? Gabriel A. Weaver, Scott Rea, Sean W. Smith Dartmouth College, Hanover, NH 03755, USA Abstract. The trustworthiness of any Public Key Infrastructure (PKI) rest

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-09-03 12:07:57
25Security-Enhanced Linux / Linux Security Modules / Type enforcement / Linux-VServer / Sandbox / Linux kernel / Operating system-level virtualization / Kernel / Operating system / System software / Software / National Security Agency

Pastures: Towards Usable Security Policy Engineering Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean Smith Dartmouth College Abstract will later review several such approaches that enjoy de facto

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2007-01-31 09:16:06
26Virtual memory / Memory management / Central processing unit / Task state segment / Global Descriptor Table / X86 assembly language / Protected mode / Interrupt descriptor table / Memory management unit / Computer architecture / X86 architecture / Interrupts

The Page-Fault Weird Machine: Lessons in Instruction-less Computation Julian Bangert, Sergey Bratus, Rebecca Shapiro, Sean W. Smith Abstract not unique to either the x86 Memory Management Unit

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2013-09-11 09:08:25
27Key management / Internet privacy / S/MIME / PERMIS / Public key certificate / X.509 / MIME / Certificate authority / Cryptography / Public-key cryptography / Email

ABUSE: PKI for Real-World Email Trust? Chris Masone, Sean Smith Dartmouth College, Hanover NHUSA Abstract. Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to det

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-09-03 12:10:34
28Distributed hash table / Tapestry / Kademlia / Peer-to-peer / Pastry / Kad network / PKI Resource Query Protocol / Trie / Gnutella / Distributed data storage / Computing / Chord

PEACHES and Peers Massimiliano Pala and Sean W. Smith Computer Science Department, Dartmouth College 6211 Sudikoff Laboratory, Hanover, NH 03755, US {pala,sws}@cs.dartmouth.edu

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 10:16:14
29Trusted computing / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Xen / Ring / Paravirtualization / Virtual machine / Rootkit / System software / Computer security / Software

TOCTOU, Traps, and Trusted Computing Sergey Bratus, Nihal D’Cunha, Evan Sparks, and Sean W. Smith Dartmouth College, Hanover, New Hampshire Abstract. The security of the standard TCG architecture depends on whether th

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-11-12 16:20:18
30Information / Password authentication protocol / Peer-to-peer / Cryptographic protocols / Client–server model / Password / Digital credential / Security Support Provider Interface / Internet protocols / Computing / Data

PPAA: Peer-to-Peer Anonymous Authentication Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-27 18:53:42
UPDATE