Sciweavers

7 search results - page 1 / 2
» aresec 2011
Sort
View
ARESEC
2011
104views more  ARESEC 2011»
12 years 4 months ago
An Inductive Approach to Provable Anonymity
—We formalise in a theorem prover the notion of provable anonymity proposed by Garcia et al. Our formalization relies on inductive definitions of message distinguish ability and...
Yongjian Li, Jun Pang
ARESEC
2011
95views more  ARESEC 2011»
12 years 4 months ago
Bulletin Boards in Voting Systems: Modelling and Measuring Privacy
—Transparency is crucial to ensuring fair, honest elections. Transparency is achieved by making information (e.g. election result) public. In e-voting literature, this publicatio...
Hugo Jonker, Jun Pang
ARESEC
2011
110views more  ARESEC 2011»
12 years 4 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
ARESEC
2011
145views more  ARESEC 2011»
12 years 4 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...
ARESEC
2011
119views more  ARESEC 2011»
12 years 4 months ago
Some Security Issues in SCALANCE Wireless Industrial Networks
—We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network ...
Marius Cristea, Bogdan Groza, Mihai Iacob