Sciweavers

488 search results - page 1 / 98
» Policy-Based Cryptography and Applications
Sort
View
FC
2005
Springer
119views Cryptology» more  FC 2005»
13 years 10 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva
ENTCS
2007
90views more  ENTCS 2007»
13 years 4 months ago
Establishment of Ad-Hoc Communities through Policy-Based Cryptography
Walid Bagga, Stefano Crosta, Pietro Michiardi, Ref...
CCS
2009
ACM
14 years 5 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 2 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...