Sciweavers

5475 search results - page 1052 / 1095
» Model Driven Security
Sort
View
92
Voted
IJNSEC
2006
113views more  IJNSEC 2006»
15 years 15 days ago
An Identity-based Mediated Signature Scheme from Bilinear Pairing
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in identity (ID)based cryptosystems. Unfortunately, none of the previou...
Xiangguo Cheng, Lifeng Guo, Xinmei Wang
89
Voted
CORR
2007
Springer
122views Education» more  CORR 2007»
15 years 15 days ago
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
Abstract. Identity-based encryption (IBE) schemes are usually used in multiplePKG environments — on the one hand, each administrative domain (e.g., a relatively small and close o...
Shengbao Wang
JCS
2008
69views more  JCS 2008»
15 years 15 days ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
97
Voted
CORR
2007
Springer
107views Education» more  CORR 2007»
15 years 15 days ago
Risk Minimization and Optimal Derivative Design in a Principal Agent Game
We consider the problem of Adverse Selection and optimal derivative design within a Principal-Agent framework. The principal’s income is exposed to non-hedgeable risk factors ar...
U. Horst, S. Moreno
120
Voted
JFP
2008
125views more  JFP 2008»
15 years 15 days ago
Types and trace effects of higher order programs
This paper shows how type effect systems can be combined with model-checking techniques to produce powerful, automatically verifiable program logics for higher order programs. The...
Christian Skalka, Scott F. Smith, David Van Horn
« Prev « First page 1052 / 1095 Last » Next »