Sciweavers

289 search results - page 58 / 58
» Formal Verification of Security Model Using SPR Tool
Sort
View
PROVSEC
2009
Springer
13 years 11 months ago
Self-enforcing Private Inference Control
Private inference control enables simultaneous enforcement of inference control and protection of users’ query privacy. Private inference control is a useful tool for database ap...
Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zho...
ESORICS
2007
Springer
13 years 8 months ago
Satisfiability and Resiliency in Workflow Systems
We propose the role-and-relation-based access control (R2 BAC) model for workflow systems. In R2 BAC, in addition to a user's role memberships, the user's relationships w...
Qihua Wang, Ninghui Li
SIGCOMM
2012
ACM
11 years 7 months ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
PODC
2003
ACM
13 years 10 months ago
Scalable public-key tracing and revoking
Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is...
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti...