Sciweavers

2270 search results - page 194 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
154
Voted
PCI
2005
Springer
15 years 9 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
116
Voted
COMPSEC
2010
142views more  COMPSEC 2010»
15 years 15 days ago
Provably correct Java implementations of Spi Calculus security protocols specifications
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi ...
Alfredo Pironti, Riccardo Sisto
151
Voted
CIIA
2009
15 years 4 months ago
LCF-style for Secure Verification Platform based on Multiway Decision Graphs
Abstract. Formal verification of digital systems is achieved, today, using one of two main approaches: states exploration (mainly model checking and equivalence checking) or deduct...
Sa'ed Abed, Otmane Aït Mohamed
PKC
2012
Springer
279views Cryptology» more  PKC 2012»
13 years 6 months ago
Circular and KDM Security for Identity-Based Encryption
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Jacob Alperin-Sheriff, Chris Peikert
120
Voted
ICDCS
1993
IEEE
15 years 8 months ago
Proxy-Based Authorization and Accounting for Distributed Systems
Despite recent widespread interest in the secure authentication of principals across computer networks there has been considerably less discussion of distributed mechanisms to sup...
B. Clifford Neuman