Sciweavers

58 search results - page 4 / 12
» esorics 2009
Sort
View
ESORICS
2009
Springer
14 years 11 months ago
Set Covering Problems in Role-Based Access Control
Abstract. Interest in role-based access control has generated considerable research activity in recent years. A number of interesting problems related to the well known set cover p...
Liang Chen, Jason Crampton
ESORICS
2009
Springer
14 years 5 months ago
Untraceable Tags Based on Mild Assumptions
Radio frequency identification (RFID) chips have been widely deployed in large-scale systems such as inventory control and supply chain management. While RFID technology has much...
Carlo Blundo, Angelo De Caro, Giuseppe Persiano
ESORICS
2009
Springer
14 years 11 months ago
Computationally Sound Analysis of a Probabilistic Contract Signing Protocol
We propose a probabilistic contract signing protocol that achieves balance even in the presence of an adversary that may delay messages sent over secure channels. To show that this...
Mihhail Aizatulin, Henning Schnoor, Thomas Wilke
ESORICS
2009
Springer
14 years 11 months ago
Tracking Information Flow in Dynamic Tree Structures
Abstract. This paper explores the problem of tracking information flow in dynamic tree structures. Motivated by the problem of manipulating the Document Object Model (DOM) trees by...
Alejandro Russo, Andrei Sabelfeld, Andrey Chudnov
ESORICS
2009
Springer
14 years 11 months ago
Keep a Few: Outsourcing Data While Maintaining Confidentiality
We put forward a novel paradigm for preserving privacy in data outsourcing which departs from encryption. The basic idea behind our proposal is to involve the owner in storing a li...
Valentina Ciriani, Sabrina De Capitani di Vimercat...