Sciweavers

CCS
2007
ACM
14 years 1 months ago
Addressing interoperability issues in access control models
Vishwas Patil, Alessandro Mei, Luigi V. Mancini
CCS
2007
ACM
14 years 1 months ago
BASE: an incrementally deployable mechanism for viable IP spoofing prevention
Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Pe...
CCS
2007
ACM
14 years 1 months ago
An information-theoretic model for adaptive side-channel attacks
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the information revealed to an attacker. This allows us to expr...
Boris Köpf, David A. Basin
CCS
2007
ACM
14 years 1 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
CCS
2007
ACM
14 years 1 months ago
Elastic block ciphers: the basic design
We introduce the concept of an elastic block cipher, which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while ...
Debra L. Cook, Angelos D. Keromytis, Moti Yung
CCS
2007
ACM
14 years 1 months ago
Security policy compliance with violation management
Julien Brunel, Frédéric Cuppens, Nor...
CCS
2007
ACM
14 years 1 months ago
Weaving rewrite-based access control policies
Anderson Santana de Oliveira, Eric Ke Wang, Claude...
CCS
2007
ACM
14 years 1 months ago
Preserving privacy in gps traces via uncertainty-aware path cloaking
Motivated by a probe-vehicle based automotive traffic monitoring system, this paper considers the problem of guaranteed anonymity in a dataset of location traces while maintainin...
Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabad...
CCS
2007
ACM
14 years 1 months ago
Analyzing the vulnerability of superpeer networks against attack
In this paper, we develop an analytical framework to measure the vulnerability of superpeer networks against attack. Two different kinds of attacks namely deterministic and degre...
Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy ...