Sciweavers

729 search results - page 74 / 146
» Towards Secure e-Services
Sort
View
MODELS
2007
Springer
14 years 3 months ago
Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet
Abstract. This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies ...
Michael Hafner, Mukhtiar Memon, Muhammad Alam
CSFW
2005
IEEE
14 years 2 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...
SIGCSE
2005
ACM
240views Education» more  SIGCSE 2005»
14 years 2 months ago
A Java framework for experimentation with steganography
This article describes a Java framework for experimentation with fundamental steganographic techniques. The framework is built on top of Java's image processing libraries and...
Kenny Hunt
SMARTNET
2000
13 years 10 months ago
Internet Service Delivery Control with Mobile Code
The trend towards value-added Internet services causes network providers to deploy new network based quality-of-service and security services. Today, however, the customer has onl...
Manuel Günter, Torsten Braun
IWSEC
2010
Springer
13 years 7 months ago
Publishing Upper Half of RSA Decryption Exponent
In the perspective of RSA, given small encryption exponent e (e.g., e = 216 + 1), the top half of the decryption exponent d can be narrowed down within a small search space. This f...
Subhamoy Maitra, Santanu Sarkar, Sourav Sengupta