Results 31 to 40 of about 1,098,399 (202)
Choreographies with Secure Boxes and Compromised Principals [PDF]
We equip choreography-level session descriptions with a simple abstraction of a security infrastructure. Message components may be enclosed within (possibly nested) "boxes" annotated with the intended source and destination of those components. The boxes are to be implemented with cryptography. Strand spaces provide a semantics for these choreographies,
arxiv +1 more source
The geometry of syntax and semantics for directed file transformations [PDF]
We introduce a conceptual framework that associates syntax and semantics with vertical and horizontal directions in principal bundles and related constructions. This notion of geometry corresponds to a mechanism for performing goal-directed file transformations such as "eliminate unsafe syntax" and suggests various engineering practices.
arxiv +1 more source
HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree [PDF]
Small-world phenomena have been observed in existing peer-to-peer (P2P) networks which has proved useful in the design of P2P file-sharing systems. Most studies of constructing small world behaviours on P2P are based on the concept of clustering peer ...
A. Ahmed+25 more
core +2 more sources
Verifying security protocols by knowledge analysis [PDF]
This paper describes a new interactive method to analyse knowledge of participants involved in security protocols and further to verify the correctness of the protocols.
Cheng, X, Ma, X
core +1 more source
Learning in Online Principal-Agent Interactions: The Power of Menus [PDF]
We study a ubiquitous learning challenge in online principal-agent problems during which the principal learns the agent's private information from the agent's revealed preferences in historical interactions. This paradigm includes important special cases such as pricing and contract design, which have been widely studied in recent literature.
arxiv
BackgroundSeveral obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information.
Carrión Señor, Inmaculada+2 more
doaj +1 more source
Based on our previous work on truly concurrent process algebras APTC, we use it to verify the security protocols. This work (called Secure APTC, abbreviated SAPTC) have the following advantages in verifying security protocols: (1) It has a firmly theoretic foundations, including equational logics, structured operational semantics, and axiomatizations ...
arxiv
A machine learning-based intrusion detection for detecting internet of things network attacks
The Internet of Things (IoT) refers to the collection of all those devices that could connect to the Internet to collect and share data. The introduction of varied devices continues to grow tremendously, posing new privacy and security risks—the ...
Yakub Kayode Saheed+4 more
doaj
An Overview on Data Security in Cloud Computing [PDF]
Cloud Computing refers to the use of computer resources as a service on-demand via internet. It is mainly based on data and applications outsourcing, traditionally stored on users' computers, to remote servers (datacenters) owned, administered and managed by third parts. This paper is an overview of data security issues in the cloud computing.
arxiv +1 more source
Validating a Web Service Security Abstraction by Typing [PDF]
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core +2 more sources