Sciweavers

DBSEC
2003
137views Database» more  DBSEC 2003»
13 years 5 months ago
Certifying Data from Multiple Sources
Abstract Data integrity can be problematic when integrating and organizing information from many sources. In this paper we describe efficient mechanisms that enable a group of data...
Glen Nuckolls, Charles U. Martel, Stuart G. Stubbl...
DBSEC
2003
113views Database» more  DBSEC 2003»
13 years 5 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
DBSEC
2003
115views Database» more  DBSEC 2003»
13 years 5 months ago
Administration Rights in the SDSD-System
The SDSD-system offers state-dependent access control in distributed object systems. The system enforces protocols which declare sets of activity sequences as allowed, thereby for...
Joachim Biskup, Thomas Leineweber, Joerg Parthe
DBSEC
2003
157views Database» more  DBSEC 2003»
13 years 5 months ago
Systematic Development of a Family of Fair Exchange Protocols
: Fair exchange protocols play an important role in application areas such as e-commerce where protocol participants require mutual guarantees that a transaction involving exchange...
Paul D. Ezhilchelvan, Santosh K. Shrivastava
DBSEC
2003
140views Database» more  DBSEC 2003»
13 years 5 months ago
Correlated Data Inference
In this paper we examine undesired inference attacks from distributed public XML documents. An undesired inference is a chain of reasoning that leads to protected data of an organ...
Csilla Farkas, Andrei Stoica
DBSEC
2001
97views Database» more  DBSEC 2001»
13 years 5 months ago
Role-based Access Control on the Web Using LDAP
Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu
DBSEC
2001
115views Database» more  DBSEC 2001»
13 years 5 months ago
Randomly roving agents for intrusion detection
Agent based intrusion detection systems IDS have advantages such as scalability, recon gurability, and survivability. In this paper, we introduce a mobile-agent based IDS, called ...
Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth...
DBSEC
2001
129views Database» more  DBSEC 2001»
13 years 5 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu
DBSEC
2001
154views Database» more  DBSEC 2001»
13 years 5 months ago
Regulating Access to XML documents
In this paper, our objective is to define a security model for regulating access to XML documents. Our model offers a security policy with a great expressive power. An XML documen...
Alban Gabillon, Emmanuel Bruno