Sciweavers

12637 search results - page 225 / 2528
» Security for Extensible Systems
Sort
View
ISCAS
2005
IEEE
129views Hardware» more  ISCAS 2005»
14 years 3 months ago
Cryptanalysis of a multistage encryption system
— This paper analyzes the security of a new multistage encryption system (MES) recently proposed in ISCAS’2004. It is found that MES is insecure against a differential chosenpl...
Chengqing Li, Xinxiao Li, Shujun Li, Guanrong Chen
WWW
2008
ACM
14 years 10 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
CSREASAM
2006
13 years 11 months ago
An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation
Enhanced Pretty Good Privacy (EPGP) is a new cryptosystem based on Pretty Good Privacy (PGP), used for the purpose of secure e-mail message communication over an open network. The...
Gregory Vert, Manaf Alfize
CCS
2008
ACM
13 years 11 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
DMDW
2000
118views Management» more  DMDW 2000»
13 years 11 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore