Sciweavers

1597 search results - page 66 / 320
» Mental Models of Computer Security
Sort
View
JOC
2000
95views more  JOC 2000»
15 years 1 months ago
Player Simulation and General Adversary Structures in Perfect Multiparty Computation
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Martin Hirt, Ueli M. Maurer
CSE
2009
IEEE
15 years 8 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
TDSC
2011
14 years 9 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
ER
2004
Springer
219views Database» more  ER 2004»
15 years 7 months ago
An Agent-Based Approach for Interleaved Composition and Execution of Web Services
The emerging paradigm of web services promises to bring to distributed computing the same flexibility that the web has brought to the publication and search of information contain...
Xiaocong Fan, Karthikeyan Umapathy, John Yen, Sand...
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 2 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella