Sciweavers

2281 search results - page 197 / 457
» Security Patterns and Secure Systems Design
Sort
View
91
Voted
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 4 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
CCS
2008
ACM
15 years 2 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
81
Voted
CDES
2006
62views Hardware» more  CDES 2006»
15 years 2 months ago
On the Management of Object Interrelationships
Still one of the main problems in computing security is the scope malicious intruders can gain by introducing their own thread of control. To make this worse, coarse grained struc...
Martin Uhl, Werner Held
90
Voted
IEEEARES
2007
IEEE
15 years 7 months ago
Dirichlet Reputation Systems
— Reputation systems can be used in online markets and communities in order to stimulate quality and good behaviour as well as to sanction poor quality and bad behaviour. The bas...
Audun Jøsang, Jochen Haller
78
Voted
CCS
2009
ACM
16 years 1 months ago
Expressive policy analysis with enhanced system dynamicity
Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy analysis should at least (i) be expressive (ii) take accou...
Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra R...