Sciweavers

10 search results - page 1 / 2
» jcs 2008
Sort
View
JCS
2008
73views more  JCS 2008»
13 years 4 months ago
Implementing interactive analysis of attack graphs using relational databases
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
JCS
2008
88views more  JCS 2008»
13 years 4 months ago
A secure compiler for session abstractions
Compiler for Session Abstractions Ricardo Corin1,2,3, Pierre-Malo Deni
Ricardo Corin, Pierre-Malo Deniélou, C&eacu...
JCS
2008
94views more  JCS 2008»
13 years 4 months ago
Preprocessing for controlled query evaluation with availability policy
Controlled Query Evaluation (CQE) defines a logical framework to protect confidential information in a database. By modeling a user's a priori knowledge appropriately, a CQE ...
Joachim Biskup, Lena Wiese
JCS
2008
109views more  JCS 2008»
13 years 4 months ago
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete
The secrecy problem for security protocols is the problem to decide whether or not a given security protocol has leaky runs. In this paper, the (initial) secrecy problem for bound...
Ferucio Laurentiu Tiplea, Catalin V. Birjoveanu, C...