Results 31 to 40 of about 1,098,399 (202)

Choreographies with Secure Boxes and Compromised Principals [PDF]

open access: yesEPTCS 12, 2009, pp. 1-15, 2009
We equip choreography-level session descriptions with a simple abstraction of a security infrastructure. Message components may be enclosed within (possibly nested) "boxes" annotated with the intended source and destination of those components. The boxes are to be implemented with cryptography. Strand spaces provide a semantics for these choreographies,
arxiv   +1 more source

The geometry of syntax and semantics for directed file transformations [PDF]

open access: yesLangSec workshop at IEEE S&P (2020); http://spw20.langsec.org/papers.html, 2020
We introduce a conceptual framework that associates syntax and semantics with vertical and horizontal directions in principal bundles and related constructions. This notion of geometry corresponds to a mechanism for performing goal-directed file transformations such as "eliminate unsafe syntax" and suggests various engineering practices.
arxiv   +1 more source

HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree [PDF]

open access: yes, 2011
Small-world phenomena have been observed in existing peer-to-peer (P2P) networks which has proved useful in the design of P2P file-sharing systems. Most studies of constructing small world behaviours on P2P are based on the concept of clustering peer ...
A. Ahmed   +25 more
core   +2 more sources

Verifying security protocols by knowledge analysis [PDF]

open access: yes, 2008
This paper describes a new interactive method to analyse knowledge of participants involved in security protocols and further to verify the correctness of the protocols.
Cheng, X, Ma, X
core   +1 more source

Learning in Online Principal-Agent Interactions: The Power of Menus [PDF]

open access: yesarXiv, 2023
We study a ubiquitous learning challenge in online principal-agent problems during which the principal learns the agent's private information from the agent's revealed preferences in historical interactions. This paradigm includes important special cases such as pricing and contract design, which have been widely studied in recent literature.
arxiv  

Are Personal Health Records Safe? A Review of Free Web-Accessible Personal Health Record Privacy Policies

open access: yesJournal of Medical Internet Research, 2012
BackgroundSeveral obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information.
Carrión Señor, Inmaculada   +2 more
doaj   +1 more source

Secure Process Algebra [PDF]

open access: yesarXiv, 2021
Based on our previous work on truly concurrent process algebras APTC, we use it to verify the security protocols. This work (called Secure APTC, abbreviated SAPTC) have the following advantages in verifying security protocols: (1) It has a firmly theoretic foundations, including equational logics, structured operational semantics, and axiomatizations ...
arxiv  

A machine learning-based intrusion detection for detecting internet of things network attacks

open access: yesAlexandria Engineering Journal, 2022
The Internet of Things (IoT) refers to the collection of all those devices that could connect to the Internet to collect and share data. The introduction of varied devices continues to grow tremendously, posing new privacy and security risks—the ...
Yakub Kayode Saheed   +4 more
doaj  

An Overview on Data Security in Cloud Computing [PDF]

open access: yes, 2018
Cloud Computing refers to the use of computer resources as a service on-demand via internet. It is mainly based on data and applications outsourcing, traditionally stored on users' computers, to remote servers (datacenters) owned, administered and managed by third parts. This paper is an overview of data security issues in the cloud computing.
arxiv   +1 more source

Validating a Web Service Security Abstraction by Typing [PDF]

open access: yes, 2004
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core   +2 more sources

Home - About - Disclaimer - Privacy