Sciweavers

469 search results - page 76 / 94
» On Adversary Models and Compositional Security
Sort
View
EUROPKI
2006
Springer
13 years 11 months ago
Short Linkable Ring Signatures Revisited
Ring signature is a group-oriented signature in which the signer can spontaneously form a group and generate a signature such that the verifier is convinced the signature was gener...
Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patri...
RBAC
1998
84views more  RBAC 1998»
13 years 9 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
IANDC
2007
152views more  IANDC 2007»
13 years 7 months ago
The reactive simulatability (RSIM) framework for asynchronous systems
We define reactive simulatability for general asynchronous systems. Roughly, simulatability means that a real system implements an ideal system (specification) in a way that pre...
Michael Backes, Birgit Pfitzmann, Michael Waidner
UML
2005
Springer
14 years 1 months ago
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques
Abstract. Aspect-Oriented Modeling (AOM) techniques allow software designers to isolate and address separately solutions for crosscutting concerns (such as security, reliability, n...
Hui Shen, Dorina C. Petriu
DCC
2005
IEEE
14 years 7 months ago
Signcryption with Non-interactive Non-repudiation
Signcryption [35] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a...
John Malone-Lee