Sciweavers

COMPSEC
2010
142views more  COMPSEC 2010»
13 years 8 months ago
Provably correct Java implementations of Spi Calculus security protocols specifications
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi ...
Alfredo Pironti, Riccardo Sisto
COMPSEC
2010
129views more  COMPSEC 2010»
13 years 8 months ago
Access control for smarter healthcare using policy spaces
Claudio Agostino Ardagna, Sabrina De Capitani di V...
COMPSEC
2010
122views more  COMPSEC 2010»
13 years 9 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
COMPSEC
2010
124views more  COMPSEC 2010»
13 years 10 months ago
A provably secure secret handshake with dynamic controlled matching
Abstract A Secret Handshake is a protocol that allows two users to mutually verify one another’s properties, and in case of simultaneous matching, to share a key used to secure s...
Alessandro Sorniotti, Refik Molva
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 10 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 11 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
COMPSEC
2010
100views more  COMPSEC 2010»
13 years 11 months ago
A note about the identifier parent property in Reed-Solomon codes
Marcel Fernandez, Josep Cotrina, Miguel Soriano, N...
COMPSEC
2010
98views more  COMPSEC 2010»
13 years 11 months ago
Managing key hierarchies for access control enforcement: Heuristic approaches
Carlo Blundo, Stelvio Cimato, Sabrina De Capitani ...
COMPSEC
2010
86views more  COMPSEC 2010»
13 years 11 months ago
A knowledgeable security model for distributed health information systems
Liang Xiao 0002, Bo Hu, Madalina Croitoru, Paul H....
COMPSEC
2010
124views more  COMPSEC 2010»
13 years 11 months ago
Runtime monitoring for next generation Java ME platform
Many modern mobile devices, such as mobile phones or Personal Digital Assistants (PDAs), are able to run Java applications, such as games, Internet browsers, chat tools and so on....
Gabriele Costa, Fabio Martinelli, Paolo Mori, Chri...