Sciweavers

2435 search results - page 434 / 487
» Question Answering in Webclopedia
Sort
View
ACISP
2009
Springer
15 years 2 months ago
Efficiency Bounds for Adversary Constructions in Black-Box Reductions
Abstract. We establish a framework for bounding the efficiency of cryptographic reductions in terms of their security transfer. While efficiency bounds for the reductions have been...
Ahto Buldas, Aivo Jürgenson, Margus Niitsoo
ASSETS
2007
ACM
15 years 2 months ago
SAMBA: a semi-automatic method for measuring barriers of accessibility
Although they play an important role in any assessment procedure, web accessibility metrics are not yet well developed and studied. In addition, most metrics are geared towards co...
Giorgio Brajnik, Raffaella Lomuscio
CCS
2007
ACM
15 years 2 months ago
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effe...
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, M...
CSFW
2010
IEEE
15 years 1 months ago
Dynamic vs. Static Flow-Sensitive Security Analysis
—This paper seeks to answer fundamental questions about trade-offs between static and dynamic security analysis. It has been previously shown that flow-sensitive static informat...
Alejandro Russo, Andrei Sabelfeld
FC
2010
Springer
135views Cryptology» more  FC 2010»
15 years 1 months ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson