Sciweavers

6555 search results - page 191 / 1311
» Secure attribute-based systems
Sort
View
120
Voted
IFIP
2004
Springer
15 years 8 months ago
Reasoning about Secure Interoperation Using Soft Constraints
Abstract The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for sy...
Stefano Bistarelli, Simon N. Foley, Barry O'Sulliv...
146
Voted
CCS
2010
ACM
15 years 2 months ago
Practical leakage-resilient identity-based encryption from simple assumptions
We provide new constructions of Leakage-Resilient IdentityBased Encryption systems (IBE) in the Standard model. We apply a hash proof technique in the existing IBE schemes of Bone...
Sherman S. M. Chow, Yevgeniy Dodis, Yannis Rousela...
105
Voted
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
15 years 9 months ago
Web Application Scanners: Definitions and Functions
There are many commercial software security assurance tools that claim to detect and prevent vulnerabilities in application software. However, a closer look at the tools often lea...
Elizabeth Fong, Vadim Okun
CAISE
2003
Springer
15 years 7 months ago
A Methodology for Multilevel Database Design
Abstract. In a Connected Society, the importance of database privacy and security increases considerably. Security must be considered as a fundamental requirement in Information Sy...
Eduardo Fernández-Medina, Mario Piattini
104
Voted
EUROCRYPT
2006
Springer
15 years 6 months ago
Language Modeling and Encryption on Packet Switched Networks
The holy grail of a mathematical model of secure encryption is to devise a model that is both faithful in its description of the real world, and yet admits a construction for an en...
Kevin S. McCurley