Sciweavers

Share
ACSAC
2000
IEEE
9 years 10 months ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr
ACSAC
2000
IEEE
9 years 11 months ago
Fair On-line Gambling
This paper proposes a fair electronic gambling scheme for the Internet. The proposed scheme provides a unique link between payment and gambling outcome so that the winner can be e...
Weiliang Zhao, Vijay Varadharajan, Yi Mu
ACSAC
2000
IEEE
9 years 11 months ago
Applications in Health Care using Public-Key Certificates and Attribute Certificates
Security infrastructures are increasingly used in the health care and welfare sector, particularly for providing security, like confidentiality, authenticity, integrity, nonrepudi...
Petra Wohlmacher, Peter Pharow
ACSAC
2000
IEEE
9 years 11 months ago
On Computer Viral Infection and the Effect of Immunization
Viruses remain a significant threat to modern networked computer systems. Despite the best efforts of those who develop anti-virus systems, new viruses and new types of virus that...
Chenxi Wang, John C. Knight, Matthew C. Elder
ACSAC
2000
IEEE
9 years 11 months ago
ITS4: A Static Vulnerability Scanner for C and C++ Code
We describe ITS4, a tool for statically scanning security-critical C source code for vulnerabilities. Compared to other approaches, our scanning technique stakes out a new middle ...
John Viega, J. T. Bloch, Y. Kohno, Gary McGraw
ACSAC
2000
IEEE
9 years 11 months ago
A Policy-based Access Control Mechanism for the Corporate Web
Current Web technologies use access control lists (ACLs) for enforcing regulations and practices governing businesses today. Having the policy hard-coded into ACLs causes manageme...
Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky
ACSAC
2000
IEEE
9 years 11 months ago
Calculating Costs for Quality of Security Service
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and re...
E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvin...
ACSAC
2000
IEEE
9 years 11 months ago
Efficient Commerce Protocols based on One-Time Pads
We present a new commerce protocol that allows customers and merchants to conduct face-to-face creditcard authorizations with a credit card company securely with the option of ano...
Michael A. Schneider, Edward W. Felten
ACSAC
2000
IEEE
9 years 11 months ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer
ACSAC
2000
IEEE
9 years 11 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
books