135
click to vote
ESORICS
15 years 6 months ago
2003 Springer
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. An enterprise privacy policy often ...
104
click to vote
ESORICS
15 years 6 months ago
2003 Springer
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
ESORICS
15 years 6 months ago
2003 Springer
Abstract. Key exchange protocols in the setting of universal composability are investigated. First we show that the ideal functionality FKE of [9] cannot be realized in the presenc...
106
click to vote
ESORICS
15 years 6 months ago
2003 Springer
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
ESORICS
15 years 6 months ago
2003 Springer
This paper considers a coalition C of enterprises {E1,..., En}, which is to be governed by a coalition policy PC , and where each memberenterprise Ei has its own internal policy Pi...
|