Sciweavers

977 search results - page 42 / 196
» Soft Constraints for Security
Sort
View
JCS
2010
80views more  JCS 2010»
14 years 4 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
CADE
2010
Springer
14 years 11 months ago
Automating Security Analysis: Symbolic Equivalence of Constraint Systems
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity ...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...
COLCOM
2008
IEEE
15 years 4 months ago
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments
Abstract. We investigate a security framework for collaborative applications that relies on the role-based access control (RBAC) model. In our framework, roles are pre-defined and...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
CORR
2008
Springer
72views Education» more  CORR 2008»
14 years 10 months ago
Lossless Compression with Security Constraints
Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are availab...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...
CP
2000
Springer
15 years 2 months ago
Constraints, Inference Channels and Secure Databases
Alexander Brodsky, Csilla Farkas, Duminda Wijeseke...