Sciweavers

3821 search results - page 85 / 765
» A Security Model for Aglets
Sort
View
SDM
2007
SIAM
190views Data Mining» more  SDM 2007»
13 years 9 months ago
AC-Framework for Privacy-Preserving Collaboration
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. Increasing security concerns have led to a surge in w...
Wei Jiang, Chris Clifton
ESORICS
2006
Springer
13 years 11 months ago
A Formal Model of Access Control for Mobile Interactive Devices
Abstract. This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary perm...
Frédéric Besson, Guillaume Dufay, Th...
CSFW
2004
IEEE
13 years 11 months ago
Symbolic Model Checking the Knowledge of the Dining Cryptographers
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
Ron van der Meyden, Kaile Su
ACSAC
1997
IEEE
13 years 12 months ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford
ICISC
2009
169views Cryptology» more  ICISC 2009»
13 years 5 months ago
Generic One Round Group Key Exchange in the Standard Model
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplif...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...