Sciweavers

762 search results - page 53 / 153
» Modeling and Simulating Information Security Management
Sort
View
ISW
2007
Springer
14 years 1 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
PADS
1997
ACM
13 years 12 months ago
Optimistic Distributed Simulation Based on Transitive Dependency Tracking
In traditional optimistic distributed simulation protocols, a logical process(LP) receiving a straggler rolls back and sends out anti-messages. Receiver of an anti-message may als...
Om P. Damani, Yi-Min Wang, Vijay K. Garg
NDSS
1997
IEEE
13 years 12 months ago
Hierarchical Organization of Certification Authorities for Secure Environments
This paper presents a model of hierarchical organization of Certification Authorities which can be applied to any open system network. In order to study the feasibility of the pro...
Lourdes López Santidrián, Justo Carr...
NOMS
2002
IEEE
131views Communications» more  NOMS 2002»
14 years 19 days ago
Tools for domain-based policy management of distributed systems
The management of policies in large-scale systems is complex because of the potentially large number of policies and administrators, as well as the diverse types of information th...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
CCS
2007
ACM
14 years 1 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder