Sciweavers

COMPSEC
2002
185views more  COMPSEC 2002»
13 years 4 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
COMPSEC
2002
92views more  COMPSEC 2002»
13 years 4 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
COMPSEC
2002
45views more  COMPSEC 2002»
13 years 4 months ago
Differentially secure multicasting and its implementation methods
S. Holeman, G. Manimaran, James Davis, Anirban Cha...
COMPSEC
2002
134views more  COMPSEC 2002»
13 years 4 months ago
The Open Source approach opportunities and limitations with respect to security and privacy
Today
Marit Hansen, Kristian Köhntopp, Andreas Pfit...
COMPSEC
2002
95views more  COMPSEC 2002»
13 years 4 months ago
Cryptanalysis of a Timestamp-Based Password Authentication Scheme
Chi-Kwong Chan, Lee-Ming Cheng