Sciweavers

10 search results - page 1 / 2
» jcs 2008
Sort
View
82
Voted
JCS
2008
98views more  JCS 2008»
14 years 9 months ago
Privacy policy enforcement in enterprises with identity management solutions
Marco Casassa Mont, Robert Thyne
67
Voted
JCS
2008
73views more  JCS 2008»
14 years 10 months ago
Implementing interactive analysis of attack graphs using relational databases
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
63
Voted
JCS
2008
88views more  JCS 2008»
14 years 10 months ago
A secure compiler for session abstractions
Compiler for Session Abstractions Ricardo Corin1,2,3, Pierre-Malo Deni
Ricardo Corin, Pierre-Malo Deniélou, C&eacu...
75
Voted
JCS
2008
94views more  JCS 2008»
14 years 9 months ago
Preprocessing for controlled query evaluation with availability policy
Controlled Query Evaluation (CQE) defines a logical framework to protect confidential information in a database. By modeling a user's a priori knowledge appropriately, a CQE ...
Joachim Biskup, Lena Wiese
90
Voted
JCS
2008
109views more  JCS 2008»
14 years 10 months ago
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete
The secrecy problem for security protocols is the problem to decide whether or not a given security protocol has leaky runs. In this paper, the (initial) secrecy problem for bound...
Ferucio Laurentiu Tiplea, Catalin V. Birjoveanu, C...