120
Voted
MMMACNS
15 years 6 months ago
2001 Springer
Abstract. In the past five years there has been tremendous activity in rolebased access control (RBAC) models. Consensus has been achieved on a standard core RBAC model that is in ...
116
Voted
MMMACNS
15 years 6 months ago
2001 Springer
If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as...
116
Voted
MMMACNS
15 years 6 months ago
2001 Springer
Abstract. With the rise of global networks like the Internet the importance of workflow systems is growing. However, security questions in such environments often only address secu...
130
Voted
MMMACNS
15 years 6 months ago
2001 Springer
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
113
Voted
MMMACNS
15 years 6 months ago
2001 Springer
The history of the application of formal methods to cryptographic protocol analysis spans nearly twenty years, and recently has been showing signs of new maturity and consolidatio...
|