Sciweavers

7 search results - page 1 / 2
» Ontological Mapping of Common Criteria's Security Assurance ...
Sort
View
SEC
2007
13 years 6 months ago
Ontological Mapping of Common Criteria's Security Assurance Requirements
The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data securit...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edga...
ICCSA
2004
Springer
13 years 10 months ago
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks
In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the...
Hoon Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moo...
AIME
2009
Springer
13 years 6 months ago
Sharable Appropriateness Criteria in GLIF3 Using Standards and the Knowledge-Data Ontology Mapper
Abstract. Creating computer-interpretable guidelines (CIGs) requires much effort. This effort would be leveraged by sharing CIGs with more than one implementing institution. Sharin...
Mor Peleg
CCS
2004
ACM
13 years 10 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
CCS
2006
ACM
13 years 8 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven