125
Voted
MMMACNS
15 years 7 months ago
2001 Springer
Abstract. In the past five years there has been tremendous activity in rolebased access control (RBAC) models. Consensus has been achieved on a standard core RBAC model that is in ...
122
Voted
MMMACNS
15 years 7 months ago
2001 Springer
If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as...
119
Voted
MMMACNS
15 years 7 months ago
2001 Springer
Abstract. With the rise of global networks like the Internet the importance of workflow systems is growing. However, security questions in such environments often only address secu...
136
Voted
MMMACNS
15 years 7 months ago
2001 Springer
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
117
Voted
MMMACNS
15 years 7 months ago
2001 Springer
The history of the application of formal methods to cryptographic protocol analysis spans nearly twenty years, and recently has been showing signs of new maturity and consolidatio...
|