Results 1 - 10
of
102
AW-RBAC: Access Control in Adaptive Workflow Systems
"... Abstract—Flexibility is one of the key challenges for Work-flow Systems nowadays. Typically, a workflow covers the follow-ing four aspects which might all be subject to change: control flow, data flow, organizational structures, and application components (services). Existing work in research and pr ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
of objects in workflow systems. Doing so, the AW-RBAC model improves security during workflow changes and reduces administration costs. The AW-RBAC model is evaluated by means of practical examples and a proof-of-concept implementation.
Verifiable Security of Boneh-Franklin Identity-Based Encryption ⋆
"... Abstract. Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbitrary identity string as an encryptionkey.SinceIBEdoesnotrequirepriorgeneration anddistribution of keys, it greatly simplifies key management in public-key cryptography. Although the concept ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
of IBE was introduced by Shamir in 1981, constructing a practical IBE scheme remained an open problem for years. The first satisfactory solution was proposed by Boneh and Franklin in 2001 and constitutes one of the most prominent applications of pairingbased cryptography. We present a game-based machine-checked
TD-ZRP: Trigger Driven Zero Remnance Proof Technique for Self Data Removal in Web Services
"... Abstract- Cyber forensic is a field which applies a detailed study on information exchanges such as data, medium, devices, locations, objectives, authenticity against the defined boundaries Here, the forensic domain derives a relationship for getting the proof of information exchange between various ..."
Abstract
- Add to MetaCart
somewhere on the system or network will leads to the malicious activities. This work covers the complete problem as define earlier using its TD-ZRP solution. It is a practical implementation of trigger driven zero remnance proof for self data destruction or removal and a secure data exchange using RSA
A Multi-Key Encryption Scheme for the Next Generation Wireless Network
"... Abstract. The fast growth of Internet technology has suggested that the next Generation Wireless Network (NGWN) will be an all-IP based integrated wireless network architecture. This evolving network will realize a great number of novel mobile network applications and innovated ubiquitous computing ..."
Abstract
- Add to MetaCart
) mechanism. This mechanism enhances the key management of Wi-Fi Protected Access 2 (WPA2), which has a strong robustness and the similar computation overhead. Through the formal proof and experimentation result, we can show that our mechanism is effective and able to provide necessary security. In the future
Service-oriented architecture and business process choreography in an order management scenario: rationale, concepts, lessons learned
- In OOPSLA ’05: Companion to the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
, 2005
"... Effective and affordable business-to-business process integration is a key success factor in the telecommunications industry. A large telecommunication wholesaler, supplying its services to more than 150 different service retailers, enhanced the process integration capabilities of its core order man ..."
Abstract
-
Cited by 19 (5 self)
- Add to MetaCart
turned out to be true proof points for the applied SOA concepts, tools, and runtime environments. To implement an automated and secured business-to-business Web services channel and to introduce a process choreography layer into a large existing application were two of the key requirements that had
A New Cloud Paradigm: Data Protection as a Service (DPASS)
"... ABSTRACT:The Paper consist of new cloud computing pattern, data protection as a service (DPASs) which is a suite of security primitives by a cloud platform, which having data security and privacy and which provide powerful proof of privacy for data owners. Despite in the presence of strongly compro ..."
Abstract
- Add to MetaCart
ABSTRACT:The Paper consist of new cloud computing pattern, data protection as a service (DPASs) which is a suite of security primitives by a cloud platform, which having data security and privacy and which provide powerful proof of privacy for data owners. Despite in the presence of strongly
1 Secure Overlay Cloud Storage with Access Control and Assured Deletion
"... Abstract—We can now outsource data backups off-site to third-party cloud storage services so as to reduce data management costs. However, we must provide security guarantees for the outsourced data, which is now maintained by third parties. We design and implement FADE, a secure overlay cloud storag ..."
Abstract
-
Cited by 17 (0 self)
- Add to MetaCart
is built upon a set of cryptographic key operations that are self-maintained by a quorum of key managers that are independent of third-party clouds. In particular, FADE acts as an overlay system that works seamlessly atop today’s cloud storage services. We implement a proof-of-concept prototype of FADE
Securing Smartphones: A Micro-TCB Approach
"... As mobile phones have evolved into ‘smartphones’, with complex operating systems running third-party software, they have become increasingly vulnerable to malicious applications (malware). We intro-duce a new design for mitigating malware attacks against smartphone users, based on a small trusted co ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
computing base module, denoted µTCB. The µTCB manages sensitive data and sensors, and provides core services to applications, independently of the operating system. The user invokes µTCB using a simple secure attention key, which is pressed in order to validate physical possession of the device
Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:
, 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract
- Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law
Results 1 - 10
of
102