Sciweavers

COMPSEC
2010
122views more  COMPSEC 2010»
13 years 9 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
COMPSEC
2010
124views more  COMPSEC 2010»
13 years 10 months ago
A provably secure secret handshake with dynamic controlled matching
Abstract A Secret Handshake is a protocol that allows two users to mutually verify one another’s properties, and in case of simultaneous matching, to share a key used to secure s...
Alessandro Sorniotti, Refik Molva
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 10 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
COMPSEC
2008
69views more  COMPSEC 2008»
13 years 11 months ago
Secure log management for privacy assurance in electronic communications
Vassilios Stathopoulos, Panayiotis Kotzanikolaou, ...
COMPSEC
2008
138views more  COMPSEC 2008»
13 years 11 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
COMPSEC
2008
113views more  COMPSEC 2008»
13 years 11 months ago
Automated containment of rootkits attacks
Abstract-- Rootkit attacks are a serious threat to computer systems. Packaged with other malware such as worms, viruses and spyware, rootkits pose a more potent threat than ever be...
Arati Baliga, Liviu Iftode, Xiaoxin Chen
COMPSEC
2008
111views more  COMPSEC 2008»
13 years 11 months ago
An ontology-based policy for deploying secure SIP-based VoIP services
-- Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the ...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
COMPSEC
2008
116views more  COMPSEC 2008»
13 years 11 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...
COMPSEC
2008
99views more  COMPSEC 2008»
13 years 11 months ago
SSL/TLS session-aware user authentication revisited
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, and there are only a few technologies available to mitigate the risks. In [OHB05], ...
Rolf Oppliger, Ralf Hauser, David A. Basin
COMPSEC
2008
102views more  COMPSEC 2008»
13 years 11 months ago
Consensus ranking - An ICT security awareness case study
H. A. Kruger, W. D. Kearney