• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,118
Next 10 →

Secure Context-sensitive Authorization

by Kazuhiro Minami, David Kotz - Journal of Pervasive and Mobile Computing , 2005
"... There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to define context-sensitive rules, such as “allow database access only to staff who are currently located in the main office. ..."
Abstract - Cited by 35 (6 self) - Add to MetaCart
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to define context-sensitive rules, such as “allow database access only to staff who are currently located in the main office

Information Flow in Secure Contexts£

by Annalisa Bossi, Damiano Macedonio, Carla Piazza, Sabina Rossi, Università Ca, Foscari Venezia
"... Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low level users, even in the presence of any possible malicious process. This requirement could be stronger than necessary when some knowledge about the environment (context) in which ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low level users, even in the presence of any possible malicious process. This requirement could be stronger than necessary when some knowledge about the environment (context) in which

Secure Contexts for Confidential Data

by Annalisa Bossi, Damiano Macedonio, Carla Piazza, Sabina Rossi
"... Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low level users, even in the presence of any possible malicious process. This requirement could be too demanding when some knowledge about the environment (context) in which the proces ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low level users, even in the presence of any possible malicious process. This requirement could be too demanding when some knowledge about the environment (context) in which

Secure Contexts (Extended Abstract)

by Annalisa Bossi, Damiano Macedonio, Carla Piazza, Sabina Rossi , 2003
"... Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demandi ..."
Abstract - Add to MetaCart
demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level

A SOUND TYPE SYSTEM FOR SECURE FLOW ANALYSIS

by Dennis Volpano, Geoffrey Smith, Cynthia Irvine , 1996
"... Ensuring secure information ow within programs in the context of multiple sensitivity levels has been widely studied. Especially noteworthy is Denning's work in secure ow analysis and the lattice model [6][7]. Until now, however, the soundness of Denning's analysis has not been established ..."
Abstract - Cited by 540 (21 self) - Add to MetaCart
Ensuring secure information ow within programs in the context of multiple sensitivity levels has been widely studied. Especially noteworthy is Denning's work in secure ow analysis and the lattice model [6][7]. Until now, however, the soundness of Denning's analysis has not been

Security Context Transfer in Vertical Handover

by unknown authors
"... Abstract – This paper presents solutions for security context transfer for vertical handover between heterogeneous networks. Seamless vertical handover is an important function of Beyond 3G systems. Context transfer can help support seamless vertical handover while maintaining required security leve ..."
Abstract - Add to MetaCart
Abstract – This paper presents solutions for security context transfer for vertical handover between heterogeneous networks. Seamless vertical handover is an important function of Beyond 3G systems. Context transfer can help support seamless vertical handover while maintaining required security

Flow analysis in the security context

by Tobias Limmer, Falko Dressler , 2008
"... Recent statistics in the Internet show high growth rates for computers infected by malicious applications, like so-called bots. These are installed on computers owned by unsuspecting users at home or within poorly maintained networks. A few years ago, malicious applications, particularly worms, prop ..."
Abstract - Add to MetaCart
current trend in security-related monitoring systems: not the exploit of vulnerable systems is being detected but aftereffects of a successful exploit are detected, e.g. installed and active versions of

Universally composable security: A new paradigm for cryptographic protocols

by Ran Canetti , 2013
"... We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved ..."
Abstract - Cited by 833 (37 self) - Add to MetaCart
, protocols are guaranteed to maintain their security in any context, even in the presence of an unbounded number of arbitrary protocol instances that run concurrently in an adversarially controlled manner. This is a useful guarantee, that allows arguing about the security of cryptographic protocols

Information Flow in Secure Contexts \Lambda

by Annalisa Bossi, Damiano Macedoniocarla Piazza, Sabina Rossi
"... Abstract Information flow security in a multilevel system aims at guaranteeing that no highlevel information is revealed to low level users, even in the presence of any possible malicious process. This requirement could be stronger than necessary when someknowledge about the environment (context) in ..."
Abstract - Add to MetaCart
Abstract Information flow security in a multilevel system aims at guaranteeing that no highlevel information is revealed to low level users, even in the presence of any possible malicious process. This requirement could be stronger than necessary when someknowledge about the environment (context

Non-Malleable Cryptography

by Danny Dolev, Cynthia Dwork, Moni Naor - SIAM Journal on Computing , 2000
"... The notion of non-malleable cryptography, an extension of semantically secure cryptography, is defined. Informally, in the context of encryption the additional requirement is that given the ciphertext it is impossible to generate a different ciphertext so that the respective plaintexts are related. ..."
Abstract - Cited by 480 (20 self) - Add to MetaCart
The notion of non-malleable cryptography, an extension of semantically secure cryptography, is defined. Informally, in the context of encryption the additional requirement is that given the ciphertext it is impossible to generate a different ciphertext so that the respective plaintexts are related
Next 10 →
Results 1 - 10 of 7,118
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University