Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Currently, the best and only evidence of the security of the OAEP encryption scheme is a proof in the contentious random oracle model. Here we give further arguments in support of...
Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Abstract. Digital signatures are often proven to be secure in the random oracle model while hash functions deviate more and more from this idealization. Liskov proposed to model a ...