Sciweavers

2335 search results - page 59 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
141
Voted
AINA
2006
IEEE
15 years 10 months ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick
LATIN
2004
Springer
15 years 10 months ago
Distributed Games and Distributed Control for Asynchronous Systems
Abstract. We introduce distributed games over asynchronous transition systems to model a distributed controller synthesis problem. A game involves two teams and is not turn-based: ...
Paul Gastin, Benjamin Lerman, Marc Zeitoun
131
Voted
KBSE
2007
IEEE
15 years 11 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
135
Voted
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
15 years 9 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
CCS
2004
ACM
15 years 10 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li