Sciweavers

JCS
2008
94views more  JCS 2008»
13 years 4 months ago
Preprocessing for controlled query evaluation with availability policy
Controlled Query Evaluation (CQE) defines a logical framework to protect confidential information in a database. By modeling a user's a priori knowledge appropriately, a CQE ...
Joachim Biskup, Lena Wiese
JCS
2008
73views more  JCS 2008»
13 years 4 months ago
Implementing interactive analysis of attack graphs using relational databases
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
JCS
2008
124views more  JCS 2008»
13 years 4 months ago
Securing information flow via dynamic capture of dependencies
Although static systems for information flow security are well-studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct adv...
Paritosh Shroff, Scott F. Smith, Mark Thober
JCS
2008
88views more  JCS 2008»
13 years 4 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
JCS
2008
93views more  JCS 2008»
13 years 4 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
JCS
2008
119views more  JCS 2008»
13 years 4 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
JCS
2008
69views more  JCS 2008»
13 years 4 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
JCS
2008
88views more  JCS 2008»
13 years 4 months ago
A secure compiler for session abstractions
Compiler for Session Abstractions Ricardo Corin1,2,3, Pierre-Malo Deni
Ricardo Corin, Pierre-Malo Deniélou, C&eacu...
JCS
2008
109views more  JCS 2008»
13 years 4 months ago
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete
The secrecy problem for security protocols is the problem to decide whether or not a given security protocol has leaky runs. In this paper, the (initial) secrecy problem for bound...
Ferucio Laurentiu Tiplea, Catalin V. Birjoveanu, C...