Sciweavers

3821 search results - page 191 / 765
» A Security Model for Aglets
Sort
View
ACSAC
2001
IEEE
14 years 26 days ago
Information Flow Analysis of Component-Structured Applications
Software component technology facilitates the costeffective development of specialized applications. Nevertheless, due to the high number of principals involved in a component-str...
Peter Herrmann
CCS
2008
ACM
13 years 11 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
ASM
2008
ASM
13 years 11 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
OOPSLA
2009
Springer
14 years 1 months ago
The operation recorder: specifying model refactorings by-example
Predefined composite operations are handy for efficient software modeling, e.g., for the automatic execution of refactor
Petra Brosch, Martina Seidl, Konrad Wieland, Manue...
JUCS
2007
96views more  JUCS 2007»
13 years 9 months ago
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
At Eurocrypt 2005, Boneh, Boyen and Goh presented a constant size ciphertext hierarchical identity based encryption (HIBE) protocol. Our main contribution is to present a variant ...
Sanjit Chatterjee, Palash Sarkar