Sciweavers

2386 search results - page 108 / 478
» Database Security 2000
Sort
View
COLCOM
2009
IEEE
15 years 2 months ago
The PEI framework for application-centric security
This paper motivates the fundamental importance of application context for security. It then gives an overview of the PEI framework for application-centric security and outlines s...
Ravi S. Sandhu
CSFW
2000
IEEE
15 years 2 months ago
How to Prevent Type Flaw Attacks on Security Protocols
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number o...
James Heather, Gavin Lowe, Steve Schneider
CRYPTO
2000
Springer
89views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
On the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of...
Zulfikar Ramzan, Leonid Reyzin
SP
2000
IEEE
15 years 1 months ago
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspec...
John A. Clark, Jeremy L. Jacob
DEXAW
2000
IEEE
112views Database» more  DEXAW 2000»
15 years 2 months ago
An Experiment in Discovering Association Rules in the Legal Domain
In this paper we explore the applicability of an algorithm designed for finding association rules in large databases to the discovery of relevant associations from a large case ba...
Trevor J. M. Bench-Capon, Frans Coenen, Paul H. Le...