Sciweavers

SP
1996
IEEE
118views Security Privacy» more  SP 1996»
14 years 4 months ago
A Fair Non-repudiation Protocol
: This paper examines the Zhou-Gollmann fair non-repudiation protocol as well as its modified version of Kim et al. We describe how these protocols are vulnerable to an attack by a...
Jianying Zhou, Dieter Gollmann
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
14 years 4 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider
SP
1996
IEEE
14 years 4 months ago
View-Based Access Control with High Assurance
View-based access control enables content-based and context-based security, as opposed to container-based security provided in operating systems. However, view-based access contro...
Xiaolei Qian
SP
1996
IEEE
136views Security Privacy» more  SP 1996»
14 years 4 months ago
On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions
Recently, two major bankcard payment instrument operators VISA and MasterCard published speci cations for securing bankcard payment transactions on open networks for open scrutiny...
Wenbo Mao
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 4 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
SP
1996
IEEE
116views Security Privacy» more  SP 1996»
14 years 4 months ago
Defining Noninterference in the Temporal Logic of Actions
Covert channels are a critical concern for multilevel secure (MLS) systems. Due to their subtlety, it is desirable to use formal methods to analyze MLS systems for the presence of...
Todd Fine
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
14 years 4 months ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
SP
1996
IEEE
14 years 4 months ago
Java Security: From HotJava to Netscape and Beyond
Drew Dean, Edward W. Felten, Dan S. Wallach
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
14 years 4 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson