Sciweavers

SP
2000
IEEE
13 years 8 months ago
A More Efficient Use of Delta-CRLs
Delta-certificate revocation lists (delta-CRLs) were designed to provide a more efficient way to distribute certificate status information. However, as this paper shows, in some e...
David A. Cooper
SP
2000
IEEE
13 years 8 months ago
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspec...
John A. Clark, Jeremy L. Jacob
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
13 years 9 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
SP
2000
IEEE
112views Security Privacy» more  SP 2000»
13 years 9 months ago
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
In this paper, we describe a novel approach to scalable group re-keying for secure multicast. Our approach, which we call Kronos, is based upon the idea of periodic group re-keyin...
Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric...
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
13 years 9 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
SP
2000
IEEE
115views Security Privacy» more  SP 2000»
13 years 9 months ago
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiao...
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
13 years 9 months ago
Robust Nonproprietary Software
Peter G. Neumann
SP
2000
IEEE
13 years 9 months ago
A Practically Implementable and Tractable Delegation Logic
We address the goal of making Delegation Logic (DL) into a practically implementable and tractable trustmanagement system. DL [22] is a logic-based knowledge representation (i.e.,...
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum
SP
2000
IEEE
13 years 9 months ago
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure
Nested certification is a methodology for efficient certificate path verification. Nested certificates can be used together with classical certificates in the Public Key Infrastru...
Albert Levi, M. Ufuk Çaglayan
SP
2000
IEEE
13 years 9 months ago
Will Openish Source Really Improve Security
Will openish source really improve security? No.
Gary McGraw