Sciweavers

3811 search results - page 105 / 763
» The Safe-Tcl Security Model
Sort
View
156
Voted
ASIACRYPT
2009
Springer
15 years 11 months ago
Secure Multi-party Computation Minimizing Online Rounds
Multi-party secure computations are general important procedures to compute any function while keeping the security of private inputs. In this work we ask whether preprocessing can...
Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yun...
134
Voted
ISPEC
2009
Springer
15 years 11 months ago
On the Correctness of an Approach against Side-Channel Attacks
Abstract. Side-channel attacks are a very powerful cryptanalytic technique. Li and Gu [ProvSec’07] proposed an approach against side-channel attacks, which states that a symmetri...
Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
168
Voted
MEDES
2010
ACM
14 years 11 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
SIS
2004
15 years 6 months ago
Towards a Systematic Development of Secure Systems
In this paper we outline a new process model for security engineering. This process model extends object oriented, use case driven software development by the systematic treatment ...
Ruth Breu, Klaus Burger, Michael Hafner, Gerhard P...
OOPSLA
2009
Springer
15 years 9 months ago
The operation recorder: specifying model refactorings by-example
Predefined composite operations are handy for efficient software modeling, e.g., for the automatic execution of refactor
Petra Brosch, Martina Seidl, Konrad Wieland, Manue...