Sciweavers

ESORICS
2007
Springer
13 years 8 months ago
Satisfiability and Resiliency in Workflow Systems
We propose the role-and-relation-based access control (R2 BAC) model for workflow systems. In R2 BAC, in addition to a user's role memberships, the user's relationships w...
Qihua Wang, Ninghui Li
ESORICS
2007
Springer
13 years 8 months ago
Pragmatic XML Access Control Using Off-the-Shelf RDBMS
As the XML model gets more popular, new needs arise to specify access control within XML model. Various XML access control models and enforcement methods have been proposed recentl...
Bo Luo, Dongwon Lee, Peng Liu
ESORICS
2007
Springer
13 years 8 months ago
Countering Statistical Disclosure with Receiver-Bound Cover Traffic
Anonymous communications provides an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, using long-term statistical analysis of...
Nayantara Mallesh, Matthew Wright
ESORICS
2007
Springer
13 years 8 months ago
Efficient Password-Based Authenticated Key Exchange Without Public Information
Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
ESORICS
2007
Springer
13 years 8 months ago
Efficient Proving for Practical Distributed Access-Control Systems
We present a new technique for generating a formal proof that an access request satisfies accesscontrol policy, for use in logic-based access-control frameworks. Our approach is t...
Lujo Bauer, Scott Garriss, Michael K. Reiter
ESORICS
2007
Springer
13 years 10 months ago
Generalized Key Delegation for Hierarchical Identity-Based Encryption
Michel Abdalla, Eike Kiltz, Gregory Neven
ESORICS
2007
Springer
13 years 10 months ago
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
Although there exist informal design guidelines and formal development support, security protocol development is time-consuming because design is error-prone. In this paper, we int...
Juan Carlos López Pimentel, Raul Monroy, Di...
ESORICS
2007
Springer
13 years 10 months ago
A Policy Language for Distributed Usage Control
We present the Obligation Specification Language (OSL), a policy language for distributed usage control. OSL supports the formalization of a wide range of usage control requiremen...
Manuel Hilty, Alexander Pretschner, David A. Basin...
ESORICS
2007
Springer
13 years 10 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...