Sciweavers

8644 search results - page 15 / 1729
» On the Composition of Secure Systems
Sort
View
108
Voted
OOPSLA
2000
Springer
15 years 8 months ago
Exclusion for composite objects
James Noble, David Holmes, John Potter
136
Voted
CSFW
2011
IEEE
14 years 4 months ago
Assumptions and Guarantees for Compositional Noninterference
Heiko Mantel, David Sands, Henning Sudbrock
EUROCRYPT
2004
Springer
15 years 10 months ago
Black-Box Composition Does Not Imply Adaptive Security
In trying to provide formal evidence that composition has security increasing properties, we ask if the composition of non-adaptively secure permutation generators necessarily pro...
Steven Myers
ISI
2004
Springer
15 years 10 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
WWW
2006
ACM
16 years 5 months ago
Capturing the essentials of federated systems
Today, the Web is increasingly used as a platform for distributed services, which transcend organizational boundaries to form federated applications. Consequently, there is a grow...
Alexander Brändle, Frederic Majer, Johannes M...