Sciweavers

1597 search results - page 108 / 320
» Mental Models of Computer Security
Sort
View
SDMW
2007
Springer
15 years 10 months ago
Query Rewriting Algorithm Evaluation for XML Security Views
Abstract. We investigate the experimental effectiveness of query rewriting over XML security views. Our model consists of access control policies specified over DTDs with XPath e...
Nataliya Rassadko
FC
2004
Springer
78views Cryptology» more  FC 2004»
15 years 9 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
ACSAC
2000
IEEE
15 years 8 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
B
2007
Springer
15 years 8 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
DCC
2008
IEEE
16 years 3 months ago
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also ...
Berkant Ustaoglu