Sciweavers

2043 search results - page 151 / 409
» Reasoning About Security Models
Sort
View
99
Voted
PDPTA
2004
15 years 2 months ago
Hierarchical Scheduling for State-based Services
Abstract-- Service descriptions based on type hiernd abstract service states ruling the availability of operations permit more secure service combinations in distributed systems de...
Jens Bruhn, Sven Kaffille, Guido Wirtz
CCS
2010
ACM
15 years 1 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
131
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Random Oracles with(out) Programmability
This paper investigates the Random Oracle Model (ROM) feature known as programmability, which allows security reductions in the ROM to dynamically choose the range points of an ide...
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Th...
130
Voted
ATAL
2008
Springer
15 years 2 months ago
A Hybrid Reputation Model Based on the Use of Organizations
In this paper we present a hybrid reputation model focused on organizational structures that attempts to solve problems associated with both centralized and decentralized reputatio...
Viviane Torres da Silva, Ramón Hermoso, Rob...
ILP
2004
Springer
15 years 6 months ago
Modelling Inhibition in Metabolic Pathways Through Abduction and Induction
Abstract. In this paper, we study how a logical form of scientific modelling that integrates together abduction and induction can be used to understand the functional class of unk...
Alireza Tamaddoni-Nezhad, Antonis C. Kakas, Stephe...