Sciweavers

ACISP
2007
Springer
13 years 11 months ago
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication
We study the multicast stream authentication problem when the communication channel is under control of an opponent who can drop, reorder and inject data packets. In this work, we...
Christophe Tartary, Huaxiong Wang
ACISP
2009
Springer
13 years 11 months ago
Efficiency Bounds for Adversary Constructions in Black-Box Reductions
Abstract. We establish a framework for bounding the efficiency of cryptographic reductions in terms of their security transfer. While efficiency bounds for the reductions have been...
Ahto Buldas, Aivo Jürgenson, Margus Niitsoo
CCS
2010
ACM
13 years 11 months ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
SP
1990
IEEE
13 years 11 months ago
Some Conundrums Concerning Separation of Duty
This paper examines some questions concerning commercial computer security integrity policies. We give an example of a dynamic separation of duty policy which cannot be implemente...
M. J. Nash, K. R. Poland
SP
1990
IEEE
13 years 11 months ago
A VMM Security Kernel for the VAX Architecture
This paper describes the development of a virtual-machine monitor (VMM) security kernel for the VAX architecture. The paper particularly focuses on how the system's hardware,...
Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin...
SP
1990
IEEE
100views Security Privacy» more  SP 1990»
13 years 11 months ago
Polyinstantiation Integrity in Multilevel Relations
Sushil Jajodia, Ravi S. Sandhu
SP
1990
IEEE
13 years 11 months ago
A Network Security Monitor
L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt,...
SP
1990
IEEE
13 years 11 months ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III