Sciweavers

1288 search results - page 70 / 258
» Securing aspect composition
Sort
View
CSFW
1999
IEEE
14 years 2 months ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch
CRYPTO
2012
Springer
247views Cryptology» more  CRYPTO 2012»
12 years 18 days ago
Black-Box Constructions of Composable Protocols without Set-Up
Abstract. We present the first black-box construction of a secure multiparty computation protocol that satisfies a meaningful notion of concurrent security in the plain model (wi...
Huijia Lin, Rafael Pass
APSEC
2007
IEEE
14 years 4 months ago
1st International Workshop on Software Patterns and Quality (SPAQu'07)
Although numbers of software pattern catalogues and languages have been published, little is known about quality of patterns, quality by patterns and quality aspects of pattern ac...
Hironori Washizaki, Nobukazu Yoshioka
DEXAW
1998
IEEE
122views Database» more  DEXAW 1998»
14 years 2 months ago
A Prototype Model for Data Warehouse Security Based on Metadata
The aim of this paper is to give an overview of security relevant aspects of existing OLAP/Data Warehouse solutions, an area which has seen rather little interest from product dev...
Nevana Katic, Gerald Quirchmayr, Josef Schiefer, M...
ISN
1998
Springer
14 years 2 months ago
Secure Billing for Mobile Information Services in UMTS
This paper presents solutions developed in the ACTS ASPeCT project for advanced security features in UMTS. In particular, a secure billing scheme for value-added information servic...
Keith M. Martin, Bart Preneel, Chris J. Mitchell, ...