enter search term and/or author name
Despite their widespread adoption, Role-based Access Control (RBAC) models exhibit certain shortcomings that make them less than ideal for deployment in, for example, distributed access control. In the distributed case, standard RBAC assumptions...
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
Shouhuai Xu, Srdjan Čapkun
Article No.: 2
Secure bootstrapping of mobile ad hoc networks (MANETs) is a challenging problem in scenarios in which network users (or nodes) do not share trust relationships prior to the network deployment. In recent years, a number of schemes have been...
New Multiparty Signature Schemes for Network Routing Applications
Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum
Article No.: 3
We construct two new multiparty digital signature schemes that allow multiple signers to sequentially and non-interactively produce a compact, fixed-length signature. First, we introduce a new primitive that we call ordered multisignature...
A Graph Based Approach Toward Network Forensics Analysis
Wei Wang, Thomas E. Daniels
Article No.: 4
In this article we develop a novel graph-based approach toward network forensics analysis. Central to our approach is the evidence graph model that facilitates evidence presentation and automated reasoning. Based on the evidence graph, we propose...
We introduce a general framework for reasoning about secrecy requirements in multiagent systems. Our definitions extend earlier definitions of secrecy and nondeducibility given by Shannon and Sutherland. Roughly speaking, one agent maintains...
This article studies the notion of quantitative policies for trust management and gives protocols for realizing them in a disclosure-minimizing fashion. Specifically, Bob values each credential with a certain number of points, and requires a...