Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
Many employers now provide electronic personal health records (PHR) to employees as part of a free or low cost health benefit program. This paper reports findings from a survey di...
Juanita Dawson, Benjamin L. Schooley, Bengisu Tulu
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
We extend the logic and semantics of authorization due to Abadi, Lampson, et al. to support restricted delegation. Our formal model provides a simple interpretation for the variety...