Sciweavers

13 search results - page 2 / 3
» compsec 2010
Sort
View
COMPSEC
2010
129views more  COMPSEC 2010»
13 years 2 months ago
Access control for smarter healthcare using policy spaces
Claudio Agostino Ardagna, Sabrina De Capitani di V...
COMPSEC
2010
124views more  COMPSEC 2010»
13 years 4 months ago
A provably secure secret handshake with dynamic controlled matching
Abstract A Secret Handshake is a protocol that allows two users to mutually verify one another’s properties, and in case of simultaneous matching, to share a key used to secure s...
Alessandro Sorniotti, Refik Molva
COMPSEC
2010
142views more  COMPSEC 2010»
13 years 2 months ago
Provably correct Java implementations of Spi Calculus security protocols specifications
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi ...
Alfredo Pironti, Riccardo Sisto
COMPSEC
2010
122views more  COMPSEC 2010»
13 years 3 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 5 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang