As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Business protocols are becoming a necessary part of Web services description [4]. The work presented in [4] investigates mechanisms for analyzing the compatibility and the substit...
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
In this paper, we propose a flexible dialogue mechanism through which a set of agents can establish a coherent set of public beliefs. Flexibility and coherence are achieved by dec...