Sciweavers

2270 search results - page 273 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
CRYPTO
2004
Springer
130views Cryptology» more  CRYPTO 2004»
15 years 10 months ago
Signature Schemes and Anonymous Credentials from Bilinear Maps
Abstract. We propose a new and efficient signature scheme that is provably secure in the plain model. The security of our scheme is based on a discrete-logarithm-based assumption p...
Jan Camenisch, Anna Lysyanskaya
ACSAC
2007
IEEE
15 years 11 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
SACMAT
2009
ACM
15 years 9 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 10 months ago
Electronic Government at the Grass Roots: Contemporary Evidence and Future Trends
In this article we explore the short and largely undocumented history of electronic government, discuss the literature of e-government at the local government level, and document ...
Stephen H. Holden, Donald F. Norris, Patricia D. F...
TISSEC
2010
142views more  TISSEC 2010»
14 years 11 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...