Sciweavers

3811 search results - page 37 / 763
» The Safe-Tcl Security Model
Sort
View
PROVSEC
2009
Springer
15 years 6 months ago
Chosen-Ciphertext Secure RSA-Type Cryptosystems
This paper explains how to design fully secure RSA-type cryptosystems from schemes only secure against passive attacks, in the standard model. We rely on instance-independence assu...
Benoît Chevallier-Mames, Marc Joye
PROVSEC
2009
Springer
15 years 6 months ago
GUC-Secure Set-Intersection Computation
Secure set-intersection computation is one of important problems in secure multiparty computation with various applications. We propose a general construction for secure 2-party se...
Yuan Tian, Hao Zhang
WETICE
2008
IEEE
15 years 6 months ago
On the Modeling of Bell-LaPadula Security Policies Using RBAC
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely acce...
Gansen Zhao, David W. Chadwick
ACSAC
1998
IEEE
15 years 4 months ago
The Solar Trust Model: Authentication Without Limitation
Michael Clifford, C. Lavine, Matt Bishop