Sciweavers

3821 search results - page 19 / 765
» A Security Model for Aglets
Sort
View
CSUR
2010
200views more  CSUR 2010»
13 years 4 months ago
Business process modeling languages: Sorting through the alphabet soup
Hafedh Mili, Guy Tremblay, Guitta Bou Jaoude, Eric...
ESORICS
2005
Springer
14 years 1 months ago
Security Notions for Disk Encryption
We define security goals and attack models for disk encryption, and prove several relationships between the resulting security notions, and some general results about disk encryp...
Kristian Gjøsteen
QSIC
2007
IEEE
14 years 1 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao
CRYPTO
2004
Springer
138views Cryptology» more  CRYPTO 2004»
14 years 27 days ago
Secure Identity Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly w...
Dan Boneh, Xavier Boyen
SIMULATION
2010
178views more  SIMULATION 2010»
13 years 2 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...