Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 10, Issue 2May 2007
Reflects downloads up to 23 Feb 2025Bibliometrics
Skip Table Of Content Section
article
On mutually exclusive roles and separation-of-duty

Separation-of-duty (SoD) is widely considered to be a fundamental principle in computer security. A static SoD (SSoD) policy states that in order to have all permissions necessary to complete a sensitive task, the cooperation of at least a certain ...

article
Batch zero-knowledge proof and verification and its applications

The batch verification technique of Bellare et al. is extended to verification of several frequently employed zero-knowledge proofs. The new techniques are correct, sound, efficient, and can be widely applied. Specific applications are discussed in ...

article
Specification and verification of security requirements in a programming model for decentralized CSCW systems

We present, in this paper, a role-based model for programming distributed CSCW systems. This model supports specification of dynamic security and coordination requirements in such systems. We also present here a model-checking methodology for verifying ...

article
Secure sessions for Web services

We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-...

Subjects

Comments