Sciweavers

3811 search results - page 16 / 763
» The Safe-Tcl Security Model
Sort
View
COMPSAC
2000
IEEE
15 years 4 months ago
Chinese Wall Security Model and Conflict Analysis
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
Tsau Young Lin
ACSAC
2000
IEEE
15 years 4 months ago
Calculating Costs for Quality of Security Service
This paper presents a Quality of Security Service (QoSS) costing framework and demonstration. A method for quantifying costs related to the security service and for storing and re...
E. Spyropoulou, Timothy E. Levin, Cynthia E. Irvin...
WS
2006
ACM
15 years 5 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
STOC
2002
ACM
97views Algorithms» more  STOC 2002»
16 years 3 days ago
Tight security proofs for the bounded-storage model
Stefan Dziembowski, Ueli M. Maurer
TCC
2007
Springer
112views Cryptology» more  TCC 2007»
15 years 6 months ago
On the Necessity of Rewinding in Secure Multiparty Computation
We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
Michael Backes, Jörn Müller-Quade, Domin...