Sciweavers

8644 search results - page 15 / 1729
» On the Composition of Secure Systems
Sort
View
OOPSLA
2000
Springer
13 years 11 months ago
Exclusion for composite objects
James Noble, David Holmes, John Potter
EUROCRYPT
2004
Springer
14 years 1 months ago
Black-Box Composition Does Not Imply Adaptive Security
In trying to provide formal evidence that composition has security increasing properties, we ask if the composition of non-adaptively secure permutation generators necessarily pro...
Steven Myers
ISI
2004
Springer
14 years 1 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
WWW
2006
ACM
14 years 8 months ago
Capturing the essentials of federated systems
Today, the Web is increasingly used as a platform for distributed services, which transcend organizational boundaries to form federated applications. Consequently, there is a grow...
Alexander Brändle, Frederic Majer, Johannes M...