Sciweavers

3821 search results - page 154 / 765
» A Security Model for Aglets
Sort
View
CCS
2008
ACM
13 years 11 months ago
EON: modeling and analyzing dynamic access control systems with logic programs
We present EON, a logic-programming language and tool that can be used to model and analyze dynamic access control systems. Our language extends Datalog with some carefully design...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani...
ICC
2007
IEEE
165views Communications» more  ICC 2007»
14 years 3 months ago
Oblivious Keyword Search Protocols in the Public Database Model
— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
Huafei Zhu, Feng Bao
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
14 years 3 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton
FORTE
2009
13 years 7 months ago
Epistemic Logic for the Applied Pi Calculus
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...
DIMVA
2011
13 years 19 days ago
Escape from Monkey Island: Evading High-Interaction Honeyclients
Abstract. High-interaction honeyclients are the tools of choice to detect malicious web pages that launch drive-by-download attacks. Unfortunately, the approach used by these tools...
Alexandros Kapravelos, Marco Cova, Christopher Kru...