Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...