Sciweavers

1288 search results - page 78 / 258
» Securing aspect composition
Sort
View
SAC
2004
ACM
14 years 3 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
CCS
2001
ACM
14 years 2 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
14 years 7 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
FSTTCS
2009
Springer
14 years 4 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
GISCIENCE
2004
Springer
136views GIS» more  GISCIENCE 2004»
14 years 3 months ago
Simplifying Sets of Events by Selecting Temporal Relations
Reasoning about events or temporal aspects is fundamental for modeling geographic phenomena. This work concerns the analysis of events as configurations of temporal intervals. It...
Andrea Rodríguez, Nico Van de Weghe, Philip...