Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CCS
2000
ACM
10 years 8 months ago
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
The Internet provides an environment where two parties, who are virtually strangers to each other, can make connections and do business together. Before any actual business starts...
Ting Yu, Xiaosong Ma, Marianne Winslett
CCS
2000
ACM
10 years 8 months ago
Accountable certificate management using undeniable attestations
This paper initiates a study of accountable certificate management methods, necessary to support long-term authenticity of digital documents. Our main contribution is a model for ...
Ahto Buldas, Peeter Laud, Helger Lipmaa
CCS
2000
ACM
10 years 8 months ago
A protocol for anonymous communication over the Internet
Ï Ø Ø ÖÓÛØ Ò ÔØ Ò Ó Ø ÁÒØ ÖÒ Ø¸ Ø Ö × Ò Ò Ö × ÒØ Ö ×Ø Ò Ñ ÒØ Ò Ò ÒÓÒÝÑ ØÝ Ò Ø Ò ØÛÓÖ º Ì × Ô Ô Ö ÔÖ × ÒØ× Ò Û...
Clay Shields, Brian Neil Levine
CCS
2000
ACM
10 years 8 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
CCS
2000
ACM
10 years 8 months ago
Composition and integrity preservation of secure reactive systems
We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the wellknown simulatability approach, i.e., the specification is an ...
Birgit Pfitzmann, Michael Waidner
CCS
2000
ACM
10 years 8 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
CCS
2000
ACM
10 years 8 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
CCS
2000
ACM
10 years 8 months ago
Evaluating certificate status information mechanisms
A wide spectrum of certificate revocation mechanisms is currently in use. A number of them have been proposed by standardisation bodies, while some others have originated from aca...
John Iliadis, Diomidis Spinellis, Dimitris Gritzal...
books