Sciweavers

10575 search results - page 1852 / 2115
» T2Script Programming Language
Sort
View
IFIP
2010
Springer
14 years 10 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
IFIP
2010
Springer
14 years 10 months ago
Secrecy and Authenticity Types for Secure Distributed Messaging
Abstract. We introduce a calculus with mobile names, distributed principals and primitives for secure remote communication, without any reference to explicit cryptography. The calc...
Michele Bugliesi, Stefano Calzavara, Damiano Maced...
IFIP
2010
Springer
14 years 10 months ago
Modeling Identity-Related Properties and Their Privacy Strength
In the last years several attempts to define identity-related properties such as identifiability, pseudonymity and anonymity have been made to analyze the privacy offered by inform...
Meilof Veeningen, Benne de Weger, Nicola Zannone
IFIP
2010
Springer
14 years 10 months ago
Task Migration for Fault-Tolerant FlexRay Networks
In this paper we present new concepts to resolve ECU (Electronic Control Unit) failures in FlexRay networks. Our approach extends the FlexRay bus schedule by redundant slots with m...
Kay Klobedanz, Gilles B. Defo, Henning Zabel, Wolf...
125
Voted
IFIP
2010
Springer
14 years 10 months ago
Evaluation of Evidence in Internet Auction Fraud Investigations
Abstract Internet auction fraud has become prevalent. Methodologies for detecting fraudulent transactions use historical information about Internet auction participants to decide w...
Michael Y. K. Kwan, Richard E. Overill, Kam-Pui Ch...
« Prev « First page 1852 / 2115 Last » Next »