Sciweavers

8644 search results - page 29 / 1729
» On the Composition of Secure Systems
Sort
View
IANDC
2008
120views more  IANDC 2008»
13 years 7 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...
AISS
2010
242views more  AISS 2010»
13 years 5 months ago
MLSF: A Framework for Multi-Level Secure Composite Web Services
Web services technologies change the software industry drastically by developing and integrating enterprise web services and applications in order to enable the users to access th...
J. G. R. Sathiaseelan, S. Albert Rabara, J. Ronald...
LCN
2005
IEEE
14 years 1 months ago
Secure Content Delivery using Key Composition
In this paper, we propose a novel framework for secure multicast on overlay networks. Our contributions are threefold: 1) a technique key composition is proposed to cope with the ...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann...
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
14 years 8 months ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
OTM
2007
Springer
14 years 1 months ago
Building Adaptive Systems with Service Composition Frameworks
Frameworks that support the implementation and execution of service compositions are a fundamental component of middleware infrastructures that support the design of adaptive syste...
Liliana Rosa, Luís Rodrigues, Antóni...