Sciweavers

429 search results - page 45 / 86
» Compositionality of Secure Information Flow
Sort
View
ETRICS
2006
15 years 1 months ago
Requirements of Information Reductions for Cooperating Intrusion Detection Agents
Abstract. We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work...
Ulrich Flegel, Joachim Biskup
IEEECIT
2006
IEEE
15 years 3 months ago
An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in Wireless Sensor Networks
In this paper we propose an improved and efficient key pre-distribution scheme for wireless sensor networks. Our scheme significantly increases the storage efficiency and security...
Al-Sakib Khan Pathan, Tran Thanh Dai, Choong Seon ...
PROVSEC
2010
Springer
14 years 7 months ago
Distinguishing Distributions Using Chernoff Information
Abstract. In this paper, we study the soundness amplification by repetition of cryptographic protocols. As a tool, we use the Chernoff Information. We specify the number of attempt...
Thomas Baignères, Pouyan Sepehrdad, Serge V...
POPL
2006
ACM
15 years 10 months ago
On flow-sensitive security types
This article investigates formal properties of a family of semantically sound flow-sensitive type systems for tracking information flow in simple While programs. The family is ind...
Sebastian Hunt, David Sands
CCS
2008
ACM
14 years 11 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...