منابع مشابه
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work towards addressing this challenge which focusses on one facet of dependability, namely data security: We give an overview on an approach for modelbased security verification which provides a traceability link to the implemen...
متن کاملStronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
In this work, we revisit the notion of Decentralized Traceable Attribute-Based Signatures (DTABS) introduced by El Kaafarani et al. (CT-RSA 2014) and improve the state-of-the-art in three dimensions: Firstly, we provide a new stronger security model which circumvents some shortcomings in existing models. Our model minimizes the trust placed in attribute authorities and hence provides, among oth...
متن کاملEfficient Traceable Signatures in the Standard Model
Traceable signatures (TS), suggested by Kiayias, Tsiounis and Yung (Eurocrypt’04), extend group signatures to address various basic traceability issues beyond merely identifying the anonymous signer of a rogue signature. Namely, they enable the efficient tracing of all signatures produced by a misbehaving party without opening the identity of other parties. They also allow users to provably cla...
متن کاملSecurity Agent Based Distributed Authorization : An Approach
This paper considers a security agent based approach to authorization in a distributed environment. A security agent is used to capture the privileges and a part of security policy in distributed authorization. Principals make use of these agents to carry out their requests on remote hosts. Targets verify the authenticity of the security agent and its privileges and use them together with their...
متن کاملSecurity, Authorization, and Authentication for Enterprise Computing
Enterprise computing (EC) is the recognition that to effectively utilize and disseminate information within an entity (university, corporation, government agency, etc.) it will be necessary to design and develop integrated distributed computing environments that allow all types of existing and future systems to interoperate. In EC, there are legacy, COTS, database, and new client/server applica...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
سال: 2019
ISSN: 0973-8975,2454-7190
DOI: 10.26782/jmcms.spl.2019.08.00025