Sciweavers

671 search results - page 19 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
14 years 4 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
15 years 10 months ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
CASCON
1997
135views Education» more  CASCON 1997»
14 years 11 months ago
Automatic generation of performance models using the distributed management framework (DMF)
The purpose of the Distributed Management Framework (DMF) is to provide a layer of ion at a level convenient for management application developers. Specifically, it liberates the ...
Asham El Rayess, Jerome A. Rolia
PROVSEC
2007
Springer
15 years 3 months ago
Stronger Security of Authenticated Key Exchange
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We observe that there are several families of attacks on AKE protocols that lie outsid...
Brian A. LaMacchia, Kristin Lauter, Anton Mityagin
AGTIVE
2007
Springer
15 years 1 months ago
Specifying Domain-Specific Refactorings for AndroMDA Based on Graph Transformation
Abstract. Applying refactoring in a model-driven software engineering context raises many new challenges that need to be addressed. In this paper, we consider model-driven software...
Gabriele Taentzer, Dirk Müller 0002, Tom Mens