F Koeune, FX Standaert - International School on Foundations of Security …, 2004 - Springer
A recent branch of cryptography focuses on the physical constraints that a real-life cryptographic device must face, and attempts to exploit these constraints (running time …
Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward …
Recently, there has been considerable interest in attribute based access control (ABAC) to overcome the limitations of the dominant access control models (ie, discretionary-DAC …
Sensor network technology promises a vast increase in automatic data collection capabilities through efficient deployment of tiny sensing devices. The technology will allow …
J Camenisch, E Van Herreweghen - … of the 9th ACM Conference on …, 2002 - dl.acm.org
Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and accountable transactions between users and service providers. As such, they represent a …
Autonomic communications seek to improve the ability of network and services to cope with unpredicted change, including changes in topology, load, task, the physical and logical …
PWL Fong - Proceedings of the first ACM conference on Data and …, 2011 - dl.acm.org
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control …
Securing communication in network applications involves many complex tasks that can be daunting even for security experts. The Named Data Networking (NDN) architecture builds …
We address the problem of authorization in large-scale, open, distributed systems. Authorization decisions are needed in electronic commerce, mobile-code execution, remote …