Sciweavers

1612 search results - page 202 / 323
» About models of security protocols
Sort
View
ACSAC
1999
IEEE
15 years 2 months ago
Generic Support for PKIX Certificate Management in CDSA
The Common Data Security Architecture (CDSA) from the Open Group is a flexible standard that defines APIs for security services needed for implementing Public Key Infrastructure (...
Shabnam Erfani, C. Sekar Chandersekaran
SACMAT
2010
ACM
14 years 8 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
EUROSYS
2008
ACM
15 years 7 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
JOC
2007
133views more  JOC 2007»
14 years 10 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
IEEEARES
2006
IEEE
15 years 4 months ago
Offline Internet Banking Fraud Detection
Nowadays, most important topic about internet banking is security. Banks’ basic concern is ensuring their customers’ electronic transactions. Nevertheless, fraudsters are beco...
Vasilis Aggelis