Sciweavers

1770 search results - page 90 / 354
» Writing requirements in computer security
Sort
View
JNW
2007
80views more  JNW 2007»
13 years 9 months ago
Providing Security Services in a Resource Discovery System
— Nowadays, portable electronic devices allow users to access available resources wherever they are. In this sense, announcement and discovering of services and resources are two...
Juan Vera del Campo, Josep Pegueroles, Miguel Sori...
IFIP
2009
Springer
14 years 3 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
ICALP
2004
Springer
14 years 2 months ago
Deciding Knowledge in Security Protocols Under Equational Theories
The analysis of security protocols requires precise formulations of the knowledge of protocol participants and attackers. In formal approaches, this knowledge is often treated in t...
Martín Abadi, Véronique Cortier
IMA
2001
Springer
78views Cryptology» more  IMA 2001»
14 years 1 months ago
Unconditionally Secure Key Agreement Protocol
Abstract. The key agreement protocol are either based on some computational infeasability, such as the calculus of the discrete logarithm in [1], or on theoretical impossibility un...
Cyril Prissette
MSS
1999
IEEE
85views Hardware» more  MSS 1999»
14 years 1 months ago
Tape Group Parity Protection
We propose a new method of ensuring the redundant storage of information on tertiary storage, especially tape storage. Conventional methods for redundant data storage on tape incl...
Theodore Johnson, Sunil Prabhakar