Sciweavers

1235 search results - page 29 / 247
» Formalizing information security knowledge
Sort
View
DAGSTUHL
2003
13 years 9 months ago
Operational Semantics of Security Protocols
Based on a concise domain analysis we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e...
Cas J. F. Cremers, Sjouke Mauw
TRUSTBUS
2009
Springer
14 years 2 months ago
A Formalization of HIPAA for a Medical Messaging System
Abstract. The complexity of regulations in healthcare, financial services, and other industries makes it difficult for enterprises to design and deploy effective compliance syste...
Peifung E. Lam, John C. Mitchell, Sharada Sundaram
CSFW
2010
IEEE
13 years 11 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 2 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
SECURWARE
2008
IEEE
14 years 2 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...