Sciweavers

556 search results - page 51 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
B
2007
Springer
15 years 3 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
JISE
2010
110views more  JISE 2010»
14 years 6 months ago
SOA-based Service Layering for Facilitating Dynamic Service Composition and Alternative Service Discovery
abstraction for ubiquitous computing. The key to service modeling of SOA-based systems is in classifying services into business, application, and orchestration layers. However, ser...
Meeyeon Lee, Jung-Won Lee, Seung Soo Park, We-Duke...
LICS
2006
IEEE
15 years 5 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
IWSEC
2007
Springer
15 years 6 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
ADHOCNOW
2006
Springer
15 years 5 months ago
Circularity-Based Medium Access Control in Mobile Ad Hoc Networks
Abstract. The RTS/CTS access scheme, designed to reduce the number of collisions in a IEEE 802.11 network, is known to exhibit problems due to masked nodes, the imbalance between t...
Mohammad Z. Ahmad, Damla Turgut, R. Bhakthavathsal...