Sciweavers

122 search results - page 3 / 25
» Modeling and analyzing security protocols in SAM: A case stu...
Sort
View
JCS
2011
91views more  JCS 2011»
13 years 1 months ago
A framework for analyzing RFID distance bounding protocols
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which lead...
Gildas Avoine, Muhammed Ali Bingöl, Süle...
RAID
2004
Springer
14 years 5 days ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
HICSS
2009
IEEE
124views Biometrics» more  HICSS 2009»
14 years 1 months ago
Case Studies of an Insider Framework
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
CONCUR
2008
Springer
13 years 8 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
SACMAT
2003
ACM
14 years 2 days ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...