Sciweavers

1779 search results - page 121 / 356
» A Formal Model of Data Privacy
Sort
View
IDTRUST
2009
ACM
15 years 11 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
ACSAC
2008
IEEE
15 years 11 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
15 years 10 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
125
Voted
ESORICS
1994
Springer
15 years 8 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen
NOMS
2008
IEEE
15 years 10 months ago
Policy-based dynamic provisioning in data centers based on SLAs, business rules and business objectives
—A policy can be defined as any type of formal behavioural guide that is input to the system. Examples of policies that can be found in data center management systems include SLA...
Angela McCloskey, Bradley Simmons, Hanan Lutfiyya