Sciweavers

ETRICS
2006
14 years 4 months ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
ETRICS
2006
14 years 4 months ago
Kleptographic Attacks on E-Voting Schemes
Marcin Gogolewski, Marek Klonowski, Przemyslaw Kub...
ETRICS
2006
14 years 4 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
ETRICS
2006
14 years 4 months ago
Requirements of Information Reductions for Cooperating Intrusion Detection Agents
Abstract. We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work...
Ulrich Flegel, Joachim Biskup
ETRICS
2006
14 years 4 months ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet
ETRICS
2006
14 years 4 months ago
Privacy-Preserving Decision Tree Mining Based on Random Substitutions
Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacypreserving decision tree mining method explored in the...
Jim Dowd, Shouhuai Xu, Weining Zhang
ETRICS
2006
14 years 4 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
ETRICS
2006
14 years 4 months ago
Allowing State Changes in Specifications
Abstract. We provide a static analysis (using both dataflow analysis and theorem proving) to allow state changes within specifications. This can be used for specification languages...
Michael Barnett, David A. Naumann, Wolfram Schulte...