Sciweavers

148 search results - page 7 / 30
» ccs 2006
Sort
View
CCS
2006
ACM
14 years 1 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
CCS
2006
ACM
14 years 1 months ago
Certified mailing lists
Email List Services (or simply, mailing lists) are becoming increasingly common for collaborative computing. In order to enable their use for official purposes with increased effe...
Himanshu Khurana, Hyung-Seok Hahm
CCS
2006
ACM
14 years 1 months ago
An efficient broadcast authentication scheme in wireless sensor networks
A broadcast authentication mechanism is important in wireless sensor networks, assuring receivers of a packet's validity. To provide authentication, some researchers utilize ...
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, ...
CCS
2006
ACM
14 years 1 months ago
Provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Fe...
CCS
2006
ACM
14 years 1 months ago
Measuring the attack surfaces of two FTP daemons
Software consumers often need to choose between different software that provide the same functionality. Today, security is a quality that many consumers, especially system adminis...
Pratyusa K. Manadhata, Jeannette M. Wing, Mark Fly...