Sciweavers

42 search results - page 2 / 9
» ieeeares 2006
Sort
View
IEEEARES
2006
IEEE
13 years 11 months ago
Feasibility of Multi-Protocol Attacks
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the...
Cas J. F. Cremers
IEEEARES
2006
IEEE
13 years 11 months ago
Towards a Security Architecture for Vehicular Ad Hoc Networks
Vehicular ad hoc networks (VANETs) have the potential to increase road safety and comfort. Especially because of the road safety functions, there is a strong demand for security i...
Klaus Plößl, Thomas Nowey, Christian Ml...
IEEEARES
2006
IEEE
13 years 11 months ago
Defining Criteria for Rating an Entity's Trustworthiness Based on Its Certificate Policy
This paper extends the work described in “An Approach to the Formalisation of a Certification Policy”, 7th International Symposium on System and Information Security (SSI 2005...
Omar Batarfi, Lindsay Marshall
IEEEARES
2006
IEEE
13 years 11 months ago
Supporting Attribute-based Access Control with Ontologies
In highly open systems like the Internet, attribute-based access control (ABAC) has proven its appropriateness. The specification and maintenance of ABAC policies however has tur...
Torsten Priebe, Wolfgang Dobmeier, Nora Kamprath
IEEEARES
2006
IEEE
13 years 11 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson