Sciweavers

CCS
2006
ACM
13 years 11 months ago
Improving secure server performance by re-balancing SSL/TLS handshakes
Much of today's distributed computing takes place in a client/server model. Despite advances in fault tolerance
Claude Castelluccia, Einar Mykletun, Gene Tsudik
CCS
2006
ACM
13 years 11 months ago
Supporting location-based conditions in access control policies
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
CCS
2006
ACM
13 years 11 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
CCS
2006
ACM
13 years 11 months ago
Provably secure password-based authentication in TLS
Michel Abdalla, Emmanuel Bresson, Olivier Chevassu...
CSFW
2004
IEEE
13 years 11 months ago
By Reason and Authority: A System for Authorization of Proof-Carrying Code
We present a system, BLF, that combines an authorization logic based on the Binder language with a logical framework, LF, able to express semantic properties of programs. BLF is a...
Nathan Whitehead, Martín Abadi, George C. N...
CSFW
2004
IEEE
13 years 11 months ago
The Consistency of Task-Based Authorization Constraints in Workflow Systems
Workflow management systems (WFMSs) have attracted a lot of interest both in academia and the business community. A workflow consists of a collection of tasks that are organized t...
Kaijun Tan, Jason Crampton, Carl A. Gunter
CSFW
2004
IEEE
13 years 11 months ago
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols
The A-GDH.2 and SA-GDH.2 authenticated group key
Olivier Pereira, Jean-Jacques Quisquater
CSFW
2004
IEEE
13 years 11 months ago
Enforcing Robust Declassification
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive informat...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
CSFW
2004
IEEE
13 years 11 months ago
Symbolic Model Checking the Knowledge of the Dining Cryptographers
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
Ron van der Meyden, Kaile Su
CSFW
2004
IEEE
13 years 11 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong