Sciweavers

2270 search results - page 65 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
SACMAT
2006
ACM
15 years 9 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
137
Voted
CTRSA
2006
Springer
176views Cryptology» more  CTRSA 2006»
15 years 7 months ago
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our...
Dan Boneh, Xavier Boyen, Shai Halevi
EUROCRYPT
2008
Springer
15 years 5 months ago
Proving Tight Security for Rabin-Williams Signatures
This paper proves "tight security in the random-oracle model relative to factorization" for the lowest-cost signature systems available today: every hash-generic signatur...
Daniel J. Bernstein
ICISC
2003
117views Cryptology» more  ICISC 2003»
15 years 4 months ago
Binary Tree Encryption: Constructions and Applications
Binary tree encryption (BTE), a relaxation of hierarchical identity-based encryption (HIBE), has recently emerged as a useful and intriguing primitive. On the one hand, the defini...
Jonathan Katz
103
Voted
ACSAC
2003
IEEE
15 years 8 months ago
Modelling Contexts in the Or-BAC Model
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (Or...
Frédéric Cuppens, Alexandre Mi&egrav...