Sciweavers

1484 search results - page 274 / 297
» Security policies for downgrading
Sort
View
IFIP
2005
Springer
14 years 26 days ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
RTA
2005
Springer
14 years 25 days ago
A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carrying code provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set ...
Amy P. Felty
SPC
2005
Springer
14 years 25 days ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
SAC
2004
ACM
14 years 24 days ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
ACNS
2004
Springer
128views Cryptology» more  ACNS 2004»
14 years 23 days ago
A Novel Framework for Alert Correlation and Understanding
Abstract. We propose a novel framework named Hidden Colored PetriNet for Alert Correlation and Understanding (HCPN-ACU) in intrusion detection system. This model is based upon the ...
Dong Yu, Deborah A. Frincke