Sciweavers

3821 search results - page 90 / 765
» A Security Model for Aglets
Sort
View
PROVSEC
2009
Springer
14 years 2 months ago
GUC-Secure Set-Intersection Computation
Secure set-intersection computation is one of important problems in secure multiparty computation with various applications. We propose a general construction for secure 2-party se...
Yuan Tian, Hao Zhang
ESORICS
1998
Springer
13 years 12 months ago
Rules for Designing Multilevel Object-Oriented Databases
When implementing a multilevel security policy for Object-Oriented Databases (OODBs), several aspects have to be investigated. One of these aspect is the design of multilevel OODB...
Frédéric Cuppens, Alban Gabillon
BIRTHDAY
2010
Springer
13 years 8 months ago
Automated Proofs for Asymmetric Encryption
Chosen-ciphertext security is by now a standard security property for asymmetric encryption. Many generic constructions for building secure cryptosystems from primitives with lower...
Judicaël Courant, Marion Daubignard, Cristian...
WETICE
2008
IEEE
14 years 2 months ago
On the Modeling of Bell-LaPadula Security Policies Using RBAC
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely acce...
Gansen Zhao, David W. Chadwick
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
14 years 1 months ago
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability ...
Tsz Hon Yuen, Victor K. Wei