Sciweavers

5476 search results - page 36 / 1096
» Resettably Secure Computation
Sort
View
CODASPY
2012
14 years 1 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
IEEESP
2010
92views more  IEEESP 2010»
15 years 2 months ago
Ethics in Security Vulnerability Research
Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis...
CORR
2011
Springer
216views Education» more  CORR 2011»
15 years 13 days ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
CONCUR
2008
Springer
15 years 7 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
ACSAC
1999
IEEE
15 years 9 months ago
Tools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...