enter search term and/or author name
An effective role administration model using organization structure
Sejong Oh, Ravi Sandhu, Xinwen Zhang
Role-based access control (RBAC) is a well-accepted model for access control in an enterprise environment. When we apply RBAC model to large enterprises, effective role administration is a major issue. ARBAC97 is a well-known solution for...
Accountability protocols: Formalized and verified
Giampaolo Bella, Lawrence C. Paulson
Classical security protocols aim to achieve authentication and confidentiality under the assumption that the peers behave honestly. Some recent protocols are required to achieve their goals even if the peer misbehaves. Accountability is a...
Battery power-aware encryption
R. Chandramouli, S. Bapatla, K. P. Subbalakshmi, R. N. Uma
Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life...
A framework for password-based authenticated key exchange1
Rosario Gennaro, Yehuda Lindell
In this paper, we present a general framework for password-based authenticated key exchange protocols, in the common reference string model. Our protocol is actually an abstraction of the key exchange protocol of Katz et al. and is based on the...