Sciweavers

2028 search results - page 168 / 406
» Deriving Relation Keys from XML Keys
Sort
View
STTT
2008
134views more  STTT 2008»
15 years 4 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
JOC
2007
129views more  JOC 2007»
15 years 4 months ago
Formal Proofs for the Security of Signcryption
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a lower computational and communica...
Joonsang Baek, Ron Steinfeld, Yuliang Zheng
TC
2002
15 years 4 months ago
Designing High Integrity Systems Using Aspects
: In this paper we show how design-level aspects can be used to develop high integrity systems. In our approach, a system designer must first identify the specific mechanisms requi...
Geri Georg, Robert B. France, Indrakshi Ray
IFIP12
2010
15 years 2 months ago
Event Extraction for Legal Case Building and Reasoning
We are interested in developing tools to support the activities of lawyers in corporate litigation. In current applications, information such as characters that have played a signi...
Nikolaos Lagos, Frédérique Segond, S...
CN
2004
122views more  CN 2004»
15 years 4 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee