Sciweavers

250 search results - page 5 / 50
» Modeling Public Key Infrastructures in the Real World
Sort
View
AISM
2004
13 years 8 months ago
PKI - Advantages and Obstacles
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
A. Jancic, Matthew J. Warren
TPHOL
2009
IEEE
14 years 2 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
HICSS
2009
IEEE
215views Biometrics» more  HICSS 2009»
14 years 2 months ago
A Real World Perspective: Employee Perspectives of Employer Sponsored Personal Health Record (PHR) Systems
Many employers now provide electronic personal health records (PHR) to employees as part of a free or low cost health benefit program. This paper reports findings from a survey di...
Juanita Dawson, Benjamin L. Schooley, Bengisu Tulu
BPM
2003
Springer
102views Business» more  BPM 2003»
14 years 20 days ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
ESORICS
2000
Springer
13 years 11 months ago
A Formal Semantics for SPKI
We extend the logic and semantics of authorization due to Abadi, Lampson, et al. to support restricted delegation. Our formal model provides a simple interpretation for the variety...
Jon Howell, David Kotz