enter search term and/or author name
How will a virus propagate in a real network? How long does it take to disinfect a network given particular values of infection rate and virus death rate? What is the single best node to immunize? Answering these questions is...
Formal foundations for hybrid hierarchies in GTRBAC
James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang
Article No.: 2
A role hierarchy defines permission acquisition and role-activation semantics through role--role relationships. It can be utilized for efficiently and effectively structuring functional roles of an organization having related access-control needs....
The cryptographic protocols that we use in everyday life rely on the secure storage of keys in consumer devices. Protecting these keys from invasive attackers, who open a device to steal its key, is a challenging problem. We propose controlled...
Dynamic access-control policies on XML encrypted data
Luc Bouganim, Francois Dang Ngoc, Philippe Pucheral
Article No.: 4
The erosion of trust put in traditional database servers and in Database Service Providers and the growing interest for different forms of selective data dissemination are different factors that lead to move the access-control from servers to...
On predictive models and user-drawn graphical passwords
P. C. van Oorschot, Julie Thorpe
Article No.: 5
In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. This leads us to ask whether other types of passwords (e.g.,...
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru, Herbert Rubens
Article No.: 6
Ah hoc networks offer increased coverage by using multihop communication. This architecture makes services more vulnerable to internal attacks coming from compromised nodes that behave arbitrarily to disrupt the network, also referred to as...