Sciweavers

3811 search results - page 9 / 763
» The Safe-Tcl Security Model
Sort
View
PAISI
2010
Springer
14 years 10 months ago
An Association Model for Implicit Crime Link Analysis
Jau-Hwang Wang, Chien-Lung Lin
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
13 years 2 months ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters
SICHERHEIT
2010
14 years 9 months ago
Bedrohungsmodellierung (Threat Modeling) in der Softwareentwicklung
: Threat Modeling erm
Fabian Schwab, Alexander Findeisen, Peter Sakal, H...
CCS
2009
ACM
16 years 11 days ago
Formalizing information security knowledge
Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper de...
Stefan Fenz, Andreas Ekelhart