NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Adapting an Electronic Purse for Internet Payments
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Liability and Computer Security: Nine Principles
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
Security and Dependability: Then and Now
CSDA '98 Proceedings of the Conference on Computer Security, Dependability, and Assurance: From Needs to Solutions
Using type enforcement to assure a configurable guard
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Hi-index | 0.00 |
The review process is an important part of many everyday activities. We introduce the concept of trusted review for electronic data. The review process is performed using an insertable security device called a Trusted Reviewer. The Trusted Reviewer can be designed to satisfy high assurance evaluation requirements. We show how the Trusted Reviewer can offer increased security in messaging, certification authorities, funds transfer, witnessing, and information downgrade.