Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ESORICS
2004
Springer
11 years 10 months ago
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage
Abstract. We revisit the classical notion of noninterference for statebased systems, as presented by Rushby in 1992. We strengthen his results in several ways, in particular clarif...
David von Oheimb
ESORICS
2004
Springer
12 years 9 hour ago
Security Property Based Administrative Controls
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ļ¬...
Jon A. Solworth, Robert H. Sloan
ESORICS
2004
Springer
12 years 9 hour ago
A Vector Model of Trust for Developing Trustworthy Systems
All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the speciļ¬cation of trust and for reaso...
Indrajit Ray, Sudip Chakraborty
ESORICS
2004
Springer
12 years 9 hour ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
ESORICS
2004
Springer
12 years 9 hour ago
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
Einar Mykletun, Maithili Narasimha, Gene Tsudik
ESORICS
2004
Springer
12 years 9 hour ago
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
This work presents a practical public-key encryption scheme that oļ¬€ers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
Bodo Möller
ESORICS
2004
Springer
12 years 9 hour ago
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data
As network traļ¬ƒc increases, the problems associated with monitoring and analyzing the traļ¬ƒc on high speed networks become increasingly diļ¬ƒcult. In this paper, we introduce a ...
John McHugh
ESORICS
2004
Springer
12 years 9 hour ago
A Formalization of Anonymity and Onion Routing
The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goa...
Sjouke Mauw, Jan Verschuren, Erik P. de Vink
ESORICS
2004
Springer
12 years 9 hour ago
Redundancy and Diversity in Security
Redundancy and diversity are commonly applied principles for fault tolerance against accidental faults. Their use in security, which is attracting increasing interest, is less gene...
Bev Littlewood, Lorenzo Strigini
ESORICS
2004
Springer
12 years 9 hour ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
books