Sciweavers

1795 search results - page 292 / 359
» Security Models and Information Flow
Sort
View
ICS
2010
Tsinghua U.
14 years 6 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
MINENET
2006
ACM
14 years 2 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
ICTCS
2007
Springer
14 years 3 months ago
Analyzing Non-Interference with respect to Classes
The information flow property of Non-Interference was recently relaxed into Abstract NonInterference (ANI), a weakened version where attackers can only observe properties of data,...
Damiano Zanardini
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
14 years 2 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
ACMSE
2005
ACM
14 years 2 months ago
Token-based dynamic trust establishment for web services
Despite recent advances in trust relationship control mechanisms, issues remain that impede the development of effective trust models. One of these is the lack of dynamic mechanis...
Zhengping Wu, Alfred C. Weaver