Sciweavers

5722 search results - page 252 / 1145
» Security Function Interactions
Sort
View
FROCOS
2007
Springer
15 years 9 months ago
Combining Algorithms for Deciding Knowledge in Security Protocols
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Mathilde Arnaud, Véronique Cortier, St&eacu...
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 10 months ago
A Secure Communication Game with a Relay Helping the Eavesdropper
—In this work a four terminal Gaussian network composed of a source, a destination, an eavesdropper and a jammer relay is studied. The jammer relay does not hear the source trans...
Melda Yuksel, Xi Liu, Elza Erkip
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
15 years 1 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
INTERACT
1997
15 years 4 months ago
What Happened to our Document in the Shared Workspace? The Need for Groupware Conventions
Conventions for conducting work with groupware are essential. They include rules for how the groupware functionality should be used for communication about work, for how data shoul...
Gloria Mark, Wolfgang Prinz
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 9 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos