Sciweavers

274 search results - page 42 / 55
» Formal procedural security modeling and analysis
Sort
View
OOPSLA
2005
Springer
14 years 1 months ago
Micro patterns in Java code
Micro patterns are similar to design patterns, except that micro patterns stand at a lower, closer to the implementation, level of abstraction. Micro patterns are also unique in t...
Joseph Gil, Itay Maman
ESORICS
1994
Springer
13 years 12 months ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
CSFW
2012
IEEE
11 years 10 months ago
Generic Indifferentiability Proofs of Hash Designs
—In this paper, we propose a formal analysis of domain extenders for hash functions in the indifferentiability framework. We define a general model for domain extenders and prov...
Marion Daubignard, Pierre-Alain Fouque, Yassine La...
ASIACRYPT
2001
Springer
14 years 11 days ago
How to Leak a Secret
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signatu...
Ronald L. Rivest, Adi Shamir, Yael Tauman
ICCV
2001
IEEE
14 years 9 months ago
Statistical Context Priming for Object Detection
There is general consensus that context can be a rich source of information about an object's identity, location and scale. However, the issue of how to formalize contextual ...
Antonio B. Torralba, Pawan Sinha