Sciweavers

2270 search results - page 223 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
IFM
2010
Springer
190views Formal Methods» more  IFM 2010»
15 years 3 months ago
On Model Checking Techniques for Randomized Distributed Systems
Abstract. The automata-based model checking approach for randomized distributed systems relies on an operational interleaving semantics of the system by means of a Markov decision ...
Christel Baier
ICDE
2008
IEEE
140views Database» more  ICDE 2008»
16 years 5 months ago
A Security Punctuation Framework for Enforcing Access Control on Streaming Data
The management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where acc...
Rimma V. Nehme, Elke A. Rundensteiner, Elisa Berti...
CRYPTO
2005
Springer
164views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Composition Does Not Imply Adaptive Security
We study the question whether the sequential or parallel composition of two functions, each indistinguishable from a random function by non-adaptive distinguishers is secure agains...
Krzysztof Pietrzak
INFOCOM
2010
IEEE
15 years 3 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
EDOC
2006
IEEE
15 years 10 months ago
Secure Dissemination of XML Content Using Structure-based Routing
The paper proposes an approach to content dissemination that exploits the structural properties of XML Document Object Model in order to provide efficient dissemination by at the...
Ashish Kundu, Elisa Bertino