Sciweavers

1288 search results - page 112 / 258
» Securing aspect composition
Sort
View
EUROCRYPT
2010
Springer
14 years 3 months ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
ACSAC
2003
IEEE
14 years 3 months ago
A Multi-View Tool for Checking the Security Semantics of Router Configurations
Routers are critical components of IP networks, but hardly any tool support for analyzing their security exists to date. We have developed such a tool, named CROCODILE, that track...
Holger Peine, Reinhard Schwarz
CNSR
2010
IEEE
145views Communications» more  CNSR 2010»
14 years 2 months ago
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to sati...
Wiem Tounsi, Joaquín García-Alfaro, ...
AICCSA
2008
IEEE
254views Hardware» more  AICCSA 2008»
14 years 10 days ago
Integrating software development security activities with agile methodologies
Because of several vulnerabilities in software products and high amount of damage caused by them, software developers are enforced to produce more secure systems. Software grows u...
Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi
MKWI
2008
137views Business» more  MKWI 2008»
13 years 11 months ago
Improving information security compliance - A process-oriented approach for managing organizational change
Abstract: Enterprises typically have to comply with many different legal, regulatory and internal requirements. Particularly in the context of information processing, there are ded...
Roland Gabriel, Sebastian Sowa, Jochen Wiedemann