Sciweavers

CMS
2006
164views Communications» more  CMS 2006»
14 years 26 days ago
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains
In this paper we describe how we have added support for dynamic delegation of authority that is enacted via the issuing of credentials from one user to another, to the XACML model ...
David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen
CMS
2006
158views Communications» more  CMS 2006»
14 years 26 days ago
On the Privacy Risks of Publishing Anonymized IP Network Traces
Networking researchers and engineers rely on network packet traces for understanding network behavior, developing models, and evaluating network performance. Although the bulk of p...
D. Koukis, Spyros Antonatos, Kostas G. Anagnostaki...
CMS
2006
14 years 26 days ago
Perturbing and Protecting a Traceable Block Cipher
At the Asiacrypt 2003 conference Billet and Gilbert introduce a block cipher, which, to quote them, has the following paradoxical traceability properties: it is computationally ea...
Julien Bringer, Hervé Chabanne, Emmanuelle ...
CMS
2006
175views Communications» more  CMS 2006»
14 years 26 days ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
CMS
2006
170views Communications» more  CMS 2006»
14 years 26 days ago
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart
Abstract. Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA) is a
Elias Athanasopoulos, Spyros Antonatos
CMS
2006
110views Communications» more  CMS 2006»
14 years 26 days ago
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
Abstract. Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhan...
Giannakis Antoniou, Campbell Wilson, Dimitris Gene...
CMS
2006
14 years 26 days ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
CMS
2006
150views Communications» more  CMS 2006»
14 years 26 days ago
Attribute Delegation Based on Ontologies and Context Information
This paper presents a model for delegation based on partial orders, proposing the subclass relation in OWL as a way to represent the partial orders. Delegation and authorization de...
Isaac Agudo, Javier Lopez, José A. Monteneg...
CMS
2006
127views Communications» more  CMS 2006»
14 years 26 days ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis
CMS
2010
138views Communications» more  CMS 2010»
14 years 27 days ago
Tor HTTP Usage and Information Leakage
This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests we show which websites are of interest to Tor users and we determined an upper bound on how...
Marcus Huber, Martin Mulazzani, Edgar Weippl