Sciweavers

2043 search results - page 89 / 409
» Reasoning About Security Models
Sort
View
AAAI
2007
14 years 29 days ago
Modeling Reciprocal Behavior in Human Bilateral Negotiation
Reciprocity is a key determinant of human behavior and has been well documented in the psychological and behavioral economics literature. This paper shows that reciprocity has sig...
Ya'akov Gal, Avi Pfeffer
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
14 years 2 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
ESORICS
2004
Springer
14 years 4 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
TMM
2002
133views more  TMM 2002»
13 years 10 months ago
A model for secure multimedia document database system in a distributed environment
Abstract--The Internet provides a universal platform for largescale distribution of information and supports inter-organizational services, system integration, and collaboration. U...
James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, ...
ICFEM
2009
Springer
14 years 5 months ago
Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language
Internet protocols encapsulate a significant amount of state, making implementing the host software complex. In this paper, we define the Statecall Policy Language (SPL) which pr...
Anil Madhavapeddy