Sciweavers

2281 search results - page 225 / 457
» Security Patterns and Secure Systems Design
Sort
View
CCS
2008
ACM
15 years 3 months ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
94
Voted
ENTCS
2007
129views more  ENTCS 2007»
15 years 1 months ago
Protocol Composition Logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. The logic is designed around a pro...
Anupam Datta, Ante Derek, John C. Mitchell, Arnab ...
114
Voted
TISSEC
2008
202views more  TISSEC 2008»
15 years 28 days ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
CCR
2010
152views more  CCR 2010»
14 years 10 months ago
CYBEX: the cybersecurity information exchange framework (x.1500)
The cybersecurity information exchange framework, known as CYBEX, is currently undergoing its first iteration of standardization efforts within ITU-T. The framework describes how ...
Anthony M. Rutkowski, Youki Kadobayashi, Inette Fu...
124
Voted
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
13 years 3 months ago
Public-Key Cryptography from New Multivariate Quadratic Assumptions
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryption schemes. In particular, we research in the following two di...
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang