Sciweavers

3811 search results - page 79 / 763
» The Safe-Tcl Security Model
Sort
View
IACR
2011
223views more  IACR 2011»
13 years 11 months ago
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Abstract. We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S´ec...
Jean-Sébastien Coron, Aline Gouget, Thomas ...
XMLSEC
2003
ACM
15 years 5 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 6 months ago
Oblivious Keyword Search Protocols in the Public Database Model
— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
Huafei Zhu, Feng Bao
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
15 years 6 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton
CCS
2001
ACM
15 years 3 months ago
A Chinese wall security model for decentralized workflow systems
Keywords
Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzole...