作者: 脆弱帶來 時間: 2025-3-21 22:49
,Rapid Mixing and Security of Chaum’s Visual Electronic Voting, many mix-servers are necessary for a fair security level. Namely, we consider probability distribution of the permutations linking the encoded votes with the decoded votes given the information revealed by randomized partial checking. We show that the variation distance between this distribution an作者: 慌張 時間: 2025-3-22 02:56 作者: jagged 時間: 2025-3-22 04:42 作者: Melanocytes 時間: 2025-3-22 12:14
On the Detection of Anomalous System Call Arguments,on technique that utilizes the information contained in these parameters. Based on our approach, we developed a host-based intrusion detection system that identifies attacks using a composition of various anomaly metrics..This paper presents our detection techniques and the tool based on them. The e作者: CAND 時間: 2025-3-22 15:59
Palgrave Studies in Classical Liberalismive the system secret parameters after more than a certain number of rounds. Then, we present a new protocol for which we can provide rigorous security proof under the Computational Diffie-Hellman (CDH) assumption..We note that even if we point out some limitation of the previous work, we still cons作者: CAND 時間: 2025-3-22 19:00 作者: OREX 時間: 2025-3-23 01:13
The Classical Theory of Economic Growththe semantic basis for composition operators. We further define such composition operators for different purposes. Our main focus it to combine usability for enterprises, e.g., by treating multiple terminologies, incomplete data, and different types of errors and defaults, with the formal rigor need作者: left-ventricle 時間: 2025-3-23 04:31
The Classification of Finite Simple Groupstion, and prove that the extended model still has all desired properties. The proof is a combination of a probabilistic, imperfect bisimulation with cryptographic reductions and static information-flow analysis..Considering symmetric primitives adds a major complication to the original model: we mus作者: FAZE 時間: 2025-3-23 06:02
Factor Analysis and Psychopathologyon technique that utilizes the information contained in these parameters. Based on our approach, we developed a host-based intrusion detection system that identifies attacks using a composition of various anomaly metrics..This paper presents our detection techniques and the tool based on them. The e作者: obviate 時間: 2025-3-23 10:13
Conference proceedings 2003ntries were: UK (16), USA (14), Germany (6), South Korea (6), Sweden (6), Italy (5), France (4) andPoland (4). Each submission was reviewed by at least three program committee members or other experts. The program committee chair and co-chair were not allowed to submit papers. The ?nal sel- tion of 作者: synchronous 時間: 2025-3-23 15:54
0302-9743 4). Each submission was reviewed by at least three program committee members or other experts. The program committee chair and co-chair were not allowed to submit papers. The ?nal sel- tion of 978-3-540-20300-1978-3-540-39650-5Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 發(fā)生 時間: 2025-3-23 20:34
Signature and Access Control Policies for XML Documents,odically (or whenever some relevant event arises) broadcasts data to clients, without the need of an explicit request. In order to make information push usable in a large variety of application domains, it is however important that the authenticity and privacy requirements of both the receiver subje作者: BACLE 時間: 2025-3-24 01:26
Authorization and Access Control in Adaptive Workflows,both ad-hoc and evolutionary changes, while ensuring correctness of process definition and their running instances. Ad-hoc and evolutionary changes impose new access control requirements, which have been neglected by adaptive workflow research and are not met by existing models for traditional workf作者: Memorial 時間: 2025-3-24 06:10 作者: 變形 時間: 2025-3-24 07:10
Initiator-Resilient Universally Composable Key Exchange, adaptive adversaries, thereby disproving a claim in [9]. We proceed to propose a modification ., which is proven to be realizable by two natural protocols for key exchange. Furthermore, sufficient conditions for securely realizing this modified functionality are given. Two notions of key exchange a作者: 入伍儀式 時間: 2025-3-24 14:26
Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing,specified small group of . excluded users can decrypt the message, even if these excluded users collude with each other in an arbitrary manner. Recently, Matsuzaki et al. pointed out a potential problem in the earlier works regarding the number of modular exponentiation, and proposed an extended sch作者: Certainty 時間: 2025-3-24 18:17 作者: Synapse 時間: 2025-3-24 22:02
Passive Attack Analysis for Connection-Based Anonymity Systems, such systems have been designed and built, their anonymity has so far not been adequately evaluated..We analyse the anonymity of connection-based systems against passive adversaries. We give a precise description of two attacks, evaluate their effectiveness, and calculate the amount of traffic nece作者: Free-Radical 時間: 2025-3-25 00:50
,Rapid Mixing and Security of Chaum’s Visual Electronic Voting,mathematical security standards, but also to be accepted by voters that do not trust electronic devices..In this scheme mix-servers are used to guarantee anonymity of the votes in the counting process. The mix-servers are operated by different parties, so an evidence of their correct operation is ne作者: gout109 時間: 2025-3-25 04:24
Towards Accountable Management of Privacy and Identity Information,t. They need to be secured and protected. Unfortunately people have little control over the destiny of this information once it has been disclosed to third parties. People rely on enterprises and organizations for its management. In most cases this is a matter of trust. This paper describes an appro作者: 乏味 時間: 2025-3-25 07:28
A Toolkit for Managing Enterprise Privacy Policies,rivacy policy often reflects different legal regulations, promises made to customers, as well as more restrictive internal practices of the enterprise. Further, it may allow customer preferences. Hence it may be authored, maintained, and audited in a distributed fashion..Our goal is to provide the t作者: 混合 時間: 2025-3-25 15:24 作者: Capture 時間: 2025-3-25 18:44 作者: condescend 時間: 2025-3-25 22:25
A Formal Security Model of the Infineon SLE 88 Smart Card Memory Management,sandboxing application programs dynamically loaded on the chip. High-level (EAL5+) evaluation of the chip requires a formal security model..We formally model the memory management system as an Interacting State Machine and prove, using Isabelle/HOL, that the associated security requirements are met.作者: Intellectual 時間: 2025-3-26 03:31
Bridging Model-Based and Language-Based Security, automatically verified. We use the Unified Modelling Language (UML) together with annotations to permit confidentiality to be considered during the whole development process from requirements to code. We have provided support for software development using UML diagrams so that the code produced can作者: Obituary 時間: 2025-3-26 05:22
An On-the-Fly Model-Checker for Security Protocol Analysis,ypes as a simple way of building an efficient on-the-fly model checker for protocols with infinite state spaces. The second is the integration of symbolic techniques for modeling a Dolev-Yao intruder, whose actions are generated in a demand-driven way. We present experiments that demonstrate that ou作者: gerrymander 時間: 2025-3-26 12:01
Symmetric Authentication within a Simulatable Cryptographic Library,ryptographic details. The typical abstraction is the Dolev-Yao model, which treats cryptographic operations as a specific term algebra. However, there is no cryptographic semantics, i.e., no theorem that says what a proof with the Dolev-Yao abstraction implies for the real protocol, even if provably作者: chuckle 時間: 2025-3-26 14:29
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection,ects in the system, according to an existing security policy specification. These flows are generated by executed system operations. Illegal flows, i.e., not authorized by the security policy, are signaled and considered as intrusion symptoms. This model is able to detect a large class of attacks, r作者: fetter 時間: 2025-3-26 18:56
Visualisation for Intrusion Detection,arm rates..Instead of building automated alarms that trigger when a computer security violation takes place, we propose to visualise the state of the computer system such that the operator himself can determine whether a violation has taken place. In effect replacing the ”burglar alarm” with a ”secu作者: spinal-stenosis 時間: 2025-3-26 21:47
On the Detection of Anomalous System Call Arguments,mal operation. Once these models have been established, subsequent events are analyzed to identify deviations, given the assumption that anomalies usually represent evidence of an attack..Host-based anomaly detection systems often rely on system call traces to build models and perform intrusion dete作者: 半圓鑿 時間: 2025-3-27 02:57 作者: enfeeble 時間: 2025-3-27 06:17
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233848.jpg作者: cauda-equina 時間: 2025-3-27 12:00 作者: 泰然自若 時間: 2025-3-27 16:11
Linear Groups over Division Rings,both ad-hoc and evolutionary changes, while ensuring correctness of process definition and their running instances. Ad-hoc and evolutionary changes impose new access control requirements, which have been neglected by adaptive workflow research and are not met by existing models for traditional workf作者: 名義上 時間: 2025-3-27 18:08
Walter E. Block,Alan G. Futermannternal policy . . that regulates its participation in the coalition. The main question addressed in this paper is how can these three policies be brought to bear, on a single transaction—given that the two internal policies . . and . . may be formulated independently of each other, and may be consi作者: 長矛 時間: 2025-3-28 01:07 作者: frozen-shoulder 時間: 2025-3-28 04:11
Palgrave Studies in Classical Liberalismspecified small group of . excluded users can decrypt the message, even if these excluded users collude with each other in an arbitrary manner. Recently, Matsuzaki et al. pointed out a potential problem in the earlier works regarding the number of modular exponentiation, and proposed an extended sch作者: anesthesia 時間: 2025-3-28 09:16
https://doi.org/10.1007/978-3-319-96583-3at existing inference control methods are generally infeasible for controlling MDR queries. We then consider restricting users to even MDR queries (that is, the MDR queries involving even numbers of data values). We show that the collection of such even MDR queries is safe if and only if a special s作者: Capitulate 時間: 2025-3-28 11:51 作者: Condescending 時間: 2025-3-28 15:03 作者: AUGUR 時間: 2025-3-28 20:53
,Marx’s Theory of Exploitation,t. They need to be secured and protected. Unfortunately people have little control over the destiny of this information once it has been disclosed to third parties. People rely on enterprises and organizations for its management. In most cases this is a matter of trust. This paper describes an appro作者: 形容詞詞尾 時間: 2025-3-29 00:49
The Classical Theory of Economic Growthrivacy policy often reflects different legal regulations, promises made to customers, as well as more restrictive internal practices of the enterprise. Further, it may allow customer preferences. Hence it may be authored, maintained, and audited in a distributed fashion..Our goal is to provide the t作者: 1FAWN 時間: 2025-3-29 07:08 作者: 無節(jié)奏 時間: 2025-3-29 09:41
https://doi.org/10.1007/978-3-642-23205-3uthentication. Such hardware secured services provide a functional root of trust that can be placed within context of a wider IT solution hence enabling strong separations of control and duty..This paper describes an approach to using such hardware-encapsulated services to create virtual trust domai作者: Sputum 時間: 2025-3-29 12:55
The Classical Theory of Integral Equationssandboxing application programs dynamically loaded on the chip. High-level (EAL5+) evaluation of the chip requires a formal security model..We formally model the memory management system as an Interacting State Machine and prove, using Isabelle/HOL, that the associated security requirements are met.作者: flaggy 時間: 2025-3-29 17:55 作者: 愛了嗎 時間: 2025-3-29 20:59 作者: cuticle 時間: 2025-3-30 00:57
The Classification of Finite Simple Groupsryptographic details. The typical abstraction is the Dolev-Yao model, which treats cryptographic operations as a specific term algebra. However, there is no cryptographic semantics, i.e., no theorem that says what a proof with the Dolev-Yao abstraction implies for the real protocol, even if provably作者: 悠然 時間: 2025-3-30 04:52
The Classification of Psychopathologyects in the system, according to an existing security policy specification. These flows are generated by executed system operations. Illegal flows, i.e., not authorized by the security policy, are signaled and considered as intrusion symptoms. This model is able to detect a large class of attacks, r作者: mitten 時間: 2025-3-30 08:19 作者: indignant 時間: 2025-3-30 13:34
Factor Analysis and Psychopathologymal operation. Once these models have been established, subsequent events are analyzed to identify deviations, given the assumption that anomalies usually represent evidence of an attack..Host-based anomaly detection systems often rely on system call traces to build models and perform intrusion dete作者: MEAN 時間: 2025-3-30 20:32
https://doi.org/10.1007/b13237Smart Card; access control; attack analysis; authentication; computer security; digital signatures; identi作者: 可觸知 時間: 2025-3-30 23:54 作者: MORT 時間: 2025-3-31 01:06
Computer Security - ESORICS 2003978-3-540-39650-5Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 多山 時間: 2025-3-31 07:01
Isomorphism Theory for the Linear Groups,fication of credential-based signature policies, supporting both single and joint signatures. Additionally, we provide an architecture for supporting the generation of selectively encrypted and authenticated XML document, ensuring at the same time the satisfaction of both access control and signature policies.作者: cogent 時間: 2025-3-31 09:31 作者: Vasoconstrictor 時間: 2025-3-31 17:12 作者: Arthritis 時間: 2025-3-31 17:34
Towards Accountable Management of Privacy and Identity Information,rivacy policies and tracing services that leverages Identifier-based Encryption (IBE) along with trusted platform technologies such as TCPA (TCG) and Tagged Operating Systems. Work is in progress to prototype this solution.作者: 衰弱的心 時間: 2025-3-31 23:40 作者: 不確定 時間: 2025-4-1 03:19