Sciweavers

2043 search results - page 129 / 409
» Reasoning About Security Models
Sort
View
NDSS
1997
IEEE
15 years 5 months ago
Hierarchical Organization of Certification Authorities for Secure Environments
This paper presents a model of hierarchical organization of Certification Authorities which can be applied to any open system network. In order to study the feasibility of the pro...
Lourdes López Santidrián, Justo Carr...
JOC
2007
94views more  JOC 2007»
15 years 19 days ago
On Unconditionally Secure Distributed Oblivious Transfer
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one o...
Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Dou...
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 5 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
91
Voted
ICDCS
2005
IEEE
15 years 6 months ago
Equational Approach to Formal Analysis of TLS
TLS has been formally analyzed with the OTS/CafeOBJ method. In the method, distributed systems are modeled as transition systems, which are written in terms of equations, and it i...
Kazuhiro Ogata, Kokichi Futatsugi
RCIS
2010
14 years 10 months ago
A conceptual model and process for client-driven agile requirements prioritization
Continuous customer-centric requirements reprioritization is essential in successfully performing agile software development. Yet, in the agile RE literature, very little is known ...
Zornitza Racheva, Maya Daneva, Andrea Herrmann, Ro...