Sciweavers

118 search results - page 16 / 24
» Towards an Algebra for Security Policies
Sort
View
SDMW
2004
Springer
15 years 5 months ago
Abstracting and Refining Authorization in SQL
ing and Refining Authorization in SQL Arnon Rosenthal, Edward Sciore1 The SQL standard specifies authorization via a large set of rather opaque rules, which are difficult to unders...
Arnon Rosenthal, Edward Sciore
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
15 years 5 months ago
FOX : A New Family of Block Ciphers
In this paper, we describe the design of a new family of block ciphers based on a Lai-Massey scheme, named FOX. The main features of this design, besides a very high security level...
Pascal Junod, Serge Vaudenay
OOPSLA
2001
Springer
15 years 4 months ago
The Java Syntactic Extender
The ability to extend a language with new syntactic forms is a powerful tool. A sufficiently flexible macro system allows programmers to build from a common base towards a langua...
Jonathan Bachrach, Keith Playford
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
14 years 11 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio
ITNG
2008
IEEE
15 years 6 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson