Sciweavers

1117 search results - page 178 / 224
» A Compliance Model of Trust
Sort
View
IJISEC
2010
87views more  IJISEC 2010»
14 years 8 months ago
How to construct identity-based signatures without the key escrow problem
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by a...
Tsz Hon Yuen, Willy Susilo, Yi Mu
OSDI
2002
ACM
15 years 10 months ago
Using Model Checking to Debug Device Firmware
Device firmware is a piece of concurrent software that achieves high performance at the cost of software complexity. They contain subtle race conditions that make them difficult t...
Sanjeev Kumar, Kai Li
SAC
2005
ACM
15 years 3 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
ACSC
2007
IEEE
15 years 4 months ago
Periodical Payment Model Using Restricted Proxy Certificates
In this paper we shall introduce a new electronic payment concept based on the popular direct debit payment model, entitled periodical payments. The direct debit model currently i...
Grigori Goldman
NSPW
1998
ACM
15 years 2 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck