Sciweavers

556 search results - page 50 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
ASIACRYPT
2007
Springer
15 years 6 months ago
Secure Protocols with Asymmetric Trust
Abstract. In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We intr...
Ivan Damgård, Yvo Desmedt, Matthias Fitzi, J...
112
Voted
EUROCRYPT
2003
Springer
15 years 5 months ago
Why Provable Security Matters?
Abstract. Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging...
Jacques Stern
IJISEC
2007
88views more  IJISEC 2007»
14 years 11 months ago
Secure group key establishment revisited
Abstract. We examine the popular proof models for group key establishment of Bresson et al. [BCPQ01,BCP01] and point out missing security properties addressing malicious protocol p...
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, ...
SCCC
1998
IEEE
15 years 4 months ago
An Adaptive Model for Programming Distributed Real-Time Applications in CORBA
CORBA is a middleware with open standardization that is receiving plenty of acceptance for facilitating the distributed objects programming. CORBA is being extended through the sp...
Carlos Montez, Rômulo Silva de Oliveira, Jon...
IPAW
2010
14 years 9 months ago
Towards a Threat Model for Provenance in e-Science
Abstract. Scientists increasingly rely on workflow management systems to perform large-scale computational scientific experiments. These systems often collect provenance informatio...
Luiz M. R. Gadelha Jr., Marta Mattoso, Michael Wil...