Sciweavers

349 search results - page 42 / 70
» Compositional Security for Task-PIOAs
Sort
View
ESORICS
2007
Springer
15 years 3 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
CCS
2004
ACM
15 years 3 months ago
Authenticity by tagging and typing
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
TCC
2005
Springer
108views Cryptology» more  TCC 2005»
15 years 3 months ago
Comparing Two Notions of Simulatability
In this work, relations between the security notions standard simulatability and universal simulatability for cryptographic protocols are investigated. A simulatability-based notio...
Dennis Hofheinz, Dominique Unruh
CSFW
1999
IEEE
15 years 2 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
CSFW
2006
IEEE
15 years 3 months ago
Games for Controls
We argue that games are expressive enough to encompass (history-based) access control, (resource) usage control (e.g., dynamic adaptive access control of reputation systems), acco...
Krishnendu Chatterjee, Radha Jagadeesan, Corin Pit...