Sciweavers

35 search results - page 3 / 7
» jcs 2006
Sort
View
JCS
2006
74views more  JCS 2006»
13 years 5 months ago
On the impossibility of building secure Cliques-type authenticated group key agreement protocols
The A-GDH.2 and SA-GDH.2 authenticated group key agreement
Olivier Pereira, Jean-Jacques Quisquater
JCS
2000
148views more  JCS 2000»
13 years 5 months ago
Using Sample Size to Limit Exposure to Data Mining
Data mining introduces new problems in database security. The basic problem of using non-sensitive data to infer sensitive data is made more difficult by the "prob abilistic&...
Chris Clifton
JCS
2002
94views more  JCS 2002»
13 years 5 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar
JCS
1998
82views more  JCS 1998»
13 years 5 months ago
On SDSI's Linked Local Name Spaces
Rivest and Lampson have recently introduced SDSI, a Simple Distributed Security Infrastructure. One of the important innovations of SDSI is the use of linked local name spaces. Th...
Martín Abadi
JCS
2006
118views more  JCS 2006»
13 years 5 months ago
Language based policy analysis in a SPKI Trust Management System
Abstract-- SPKI/SDSI is a standard for issuing authorization and name certificates. SPKI/SDSI can be used to implement a Trust Management System, where the policy for resource acce...
Arun K. Eamani, A. Prasad Sistla