Sciweavers

1597 search results - page 23 / 320
» Mental Models of Computer Security
Sort
View
FOCS
2010
IEEE
14 years 11 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
WETICE
2003
IEEE
15 years 7 months ago
Attack-Resistance of Computational Trust Models
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
Andrew Twigg, Nathan Dimmock
SERVICES
2010
201views more  SERVICES 2010»
14 years 8 months ago
IT Auditing to Assure a Secure Cloud Computing
In this paper we discuss the evolvement of cloud computing paradigm and present a framework for secure cloud computing through IT auditing. Our approach is to establish a general ...
Zhixiong Chen, John Yoon
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 7 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
160
Voted
IADIS
2004
15 years 3 months ago
Implementing Cognitive Modellig in CS Education: Aligning Theory and Practice of Learning to Program
It can be argued that although computer science may seem one of the best researched areas, it could also be one of the worst taught. In this research we examine the residual probl...
Des Traynor, J. Gibson