Sciweavers

1795 search results - page 277 / 359
» Security Models and Information Flow
Sort
View
140
Voted
CCS
2008
ACM
15 years 5 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
126
Voted
WWW
2005
ACM
16 years 4 months ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
103
Voted
POLICY
2004
Springer
15 years 9 months ago
Towards a Multi-dimensional Characterization of Dissemination Control
Dissemination control (DCON) is emerging as one of the most important and challenging goals for information security. DCON is concerned with controlling information and digital ob...
Roshan K. Thomas, Ravi S. Sandhu
108
Voted
ISW
2001
Springer
15 years 8 months ago
Suitability of a Classical Analysis Method for E-commerce Protocols
We present the adaptation of our model for the validation of key distribution and authentication protocols to address specific needs of protocols for electronic commerce. The two ...
Sigrid Gürgens, Javier Lopez
126
Voted
ISW
2010
Springer
15 years 1 months ago
Implicit Authentication through Learning User Behavior
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these...
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Ch...