Sciweavers

5119 search results - page 169 / 1024
» Security Privacy
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell
CCS
2006
ACM
15 years 7 months ago
Is risk a good security metric?
Why measuring security? To make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during d...
O. Sami Saydjari
143
Voted
ACISP
2007
Springer
15 years 8 months ago
Efficient and Secure Comparison for On-Line Auctions
In this note, we describe a correction to the cryptosystem proposed in [1, 2]. Although the correction is small and does not affect the performance of the protocols from [1, 2], it...
Ivan Damgård, Martin Geisler, Mikkel Kr&osla...
114
Voted
ACISP
2006
Springer
15 years 7 months ago
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
Abstract. A security proof in the Bellare
Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria
GIS
2008
ACM
15 years 5 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray