Sciweavers

2652 search results - page 75 / 531
» When Information Improves Information Security
Sort
View
CSFW
1999
IEEE
15 years 2 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
ISW
2004
Springer
15 years 3 months ago
How to Break and Repair a Universally Composable Signature Functionality
Abstract. Canetti and Rabin recently proposed a universally composable ideal functionality FSIG for digital signatures. We show that this functionality cannot be securely realized ...
Michael Backes, Dennis Hofheinz
ICICS
1997
Springer
15 years 2 months ago
An implementable scheme for secure delegation of computing and data
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, d...
Josep Domingo-Ferrer, Ricardo X. Sanchez del Casti...
ITRUST
2005
Springer
15 years 3 months ago
Modeling Social and Individual Trust in Requirements Engineering Methodologies
Abstract. When we model and analyze trust in organizations or information systems we have to take into account two different levels of analysis: social and individual. Social leve...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
CISS
2011
IEEE
14 years 1 months ago
New hypothesis testing-based methods for fault detection for smart grid systems
Abstract—Fault detection plays an indispensable role in ensuring the security of smart grid systems. Based on the dynamics of the generators, we show the time evolution of the sm...
Qian He, Rick S. Blum