122
click to vote
MMMACNS
15 years 7 months ago
2001 Springer
Abstract. In the past five years there has been tremendous activity in rolebased access control (RBAC) models. Consensus has been achieved on a standard core RBAC model that is in ...
118
click to vote
MMMACNS
15 years 7 months ago
2001 Springer
If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as...
117
click to vote
MMMACNS
15 years 7 months ago
2001 Springer
Abstract. With the rise of global networks like the Internet the importance of workflow systems is growing. However, security questions in such environments often only address secu...
133
click to vote
MMMACNS
15 years 7 months ago
2001 Springer
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
114
click to vote
MMMACNS
15 years 7 months ago
2001 Springer
The history of the application of formal methods to cryptographic protocol analysis spans nearly twenty years, and recently has been showing signs of new maturity and consolidatio...
|