Sciweavers

640 search results - page 104 / 128
» Reasoning About Web-Site Structure
Sort
View
IANDC
2008
120views more  IANDC 2008»
13 years 7 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...
PUC
2006
72views more  PUC 2006»
13 years 7 months ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon
IJMMS
2007
79views more  IJMMS 2007»
13 years 7 months ago
Incorporating tutoring principles into interactive knowledge acquisition
This paper argues that interactive knowledge acquisition systems would benefit from a tighter and more thorough incorporation of tutoring and learning principles. Current acquisit...
Jihie Kim, Yolanda Gil
COMPSEC
2002
92views more  COMPSEC 2002»
13 years 7 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 7 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker