Sciweavers

859 search results - page 3 / 172
» Security for Key Management Interfaces
Sort
View
ACISP
2003
Springer
13 years 10 months ago
Separating Encryption and Key Issuance in Digital Rights Management Systems
Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go ...
AINA
2006
IEEE
14 years 13 days ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick
ESORICS
2009
Springer
14 years 7 months ago
A Generic Security API for Symmetric Key Management on Cryptographic Devices
Security APIs are used to define the boundary between trusted and untrusted code. The security properties of existing APIs are not always clear. In this paper, we give a new generi...
Véronique Cortier, Graham Steel
CCS
2001
ACM
13 years 11 months ago
Formalizing GDOI group key management requirements in NPATRL
Although there is a substantial amount of work on formal requirements for two and three-party key distribution protocols, very little has been done on requirements for group proto...
Catherine Meadows, Paul F. Syverson
COMPSEC
2002
92views more  COMPSEC 2002»
13 years 6 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong