Filters








41 Hits in 7.0 sec

Formal analysis of some secure procedures for certificate delivery

Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
2006 Software testing, verification & reliability  
The formal analysis is carried out by means of a software tool for the automatic verification of cryptographic protocols with finite behaviour.  ...  The paper describes and formally analyzes two communication protocols to manage the secure emission of digital certificates.  ...  -The application of automated verification tools is useful to better understand how certain mechanisms and checks ensure certain security features of communication protocols.  ... 
doi:10.1002/stvr.329 fatcat:2q4goyyfuzfzxgk3poexdh2xja

How to survive identity management in the Industry 4.0 era

Jasone Astorga, Marc Barcelo, Aitor Urbieta, Eduardo Jacob
2021 IEEE Access  
mechanisms of the SCEP message exchange.  ...  As the proposed security mechanism is designed like a wrapper around the standard SCEP protocol, it can be easily implemented and deployed.  ... 
doi:10.1109/access.2021.3092203 fatcat:x555a7vwv5g5xlydxmxmvtn4yq

Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol [chapter]

Dan Zhou, Shiu-Kai Chin
1999 Lecture Notes in Computer Science  
To construct a highly-assured implementation of secure communication channels we must have clear definitions of the security services, the channels, and under what assumptions these channels provide the  ...  We formally define secure channel services and develop a detailed example. The example is a core protocol common to a family of secure email systems.  ...  This will likely require a reformulation of confidentiality as it relates to implementation.  ... 
doi:10.1007/3-540-48119-2_42 fatcat:xaucsuit5ngstdkjv2ueobxiva

Dynamic Validity Period Calculation of Digital Certificates Based on Aggregated Security Assessment

Alexander Beck
2012 International Journal on Cryptography and Information Security  
This kind of security assessment can be executed periodically in order to dynamically respond to changing conditions.  ...  The paper proposes a method based on different security-related factors to dynamically calculate the validity period of digital certificates.  ...  Below some basics of manual assessments and a new concept for a pragmatic automated process is discussed.  ... 
doi:10.5121/ijcis.2012.2401 fatcat:74eughgbmbck7fafqcmh6aplfy

Finding the PKI needles in the Internet haystack

Massimiliano Pala, Sean W. Smith
2010 Journal of Computer Security  
This issue impacts especially on the usability of this technology and the interoperability of PKIs in open environments such as the Internet.  ...  In this paper, we present the design and prototype of a new and flexible solution for automatic discovery of the services and data repositories made available by a Certificate Service Provider (CSP).  ...  This work was supported in part by the NSF (under Grant CNS-0448499), the US Department of Homeland Security (under Grant Award No. 2006-CS-001-000001) and Sun Microsystems.  ... 
doi:10.3233/jcs-2010-0401 fatcat:toixn6rwnjh6xgfm6pova5ksle

NATO-EU Cooperation on C4ISR Capabilities for Crisis Management

Amleto Gabellone
2011 Information & Security An International Journal  
and to avoid or alleviate the consequences of natural or man-made disasters.  ...  the key driver to overcome the political issues that still undermine NATO and EU cooperation and therefore a pragmatic approach to pooling and sharing of capabilities, thus preventing duplication of efforts  ...  Some of NATO SPS and EU FP7 platform's activities directly address Crisis Management, such as SPS's defence-related environmental issues, environmental security, eco-terrorism countermeasures, disaster  ... 
doi:10.11610/isij.2705 fatcat:zqbmhjydafb3zpami7hbuvrtdi

The EuroPKI Experience [chapter]

Antonio Lioy, Marius Marian, Natalia Moltchanova, Massimiliano Pala
2004 Lecture Notes in Computer Science  
The article closes with an overview of the EuroPKI activity plans and perspective.  ...  This paper discusses the technical and management experience gained in the day-by-day operation of the EuroPKI infrastructure.  ...  Bucharest, Provincia di Macerata, PWR Centre for Networking and Supercomputing, SETCCE, University of Modena and Reggio Emilia) as well as the past ones and every partner of the ICE-TEL, ICE-CAR and NASTEC  ... 
doi:10.1007/978-3-540-25980-0_2 fatcat:kafej5vorzhabe75ljcixsa3q4

CYBERSPACESE CURITY RELEVANCE IN THE TIME OF WEB 2.0

UROŠ SVETE, ANJA KOLAK
2011 CONTEMPORARY MILITARY CHALLENGES  
In the paper, importance of the cyberspace has been analysed by security theories and with special focus on the Web 2.0 and WikiLeaks issue.  ...  The current way of such interactive communication is namely based on individuals as data and information producers, which could be in (Western) countries perceived as a greater challenge and in some cases  ...  challenge and in some cases even national security threat.  ... 
doi:10.33179/bsv.99.svi.11.cmc.13.3.2 fatcat:7j7kibuxsngzzhftgjizajifiq

Background and Definitions [chapter]

2013 Modern Geopolitics and Security  
Our Space Commercialization Experts Panel (SCEP) earned special thanks for guiding the study to fruition, and for helping to develop its findings and recommendations.  ...  U.S. national security and foreign policy interests.  ...  For example, there are fluid mechanics and transport phenomena that can be observed in the microgravity environment of space that are masked on earth. 32 In addition, some areas of biological research  ... 
doi:10.1201/b16082-2 fatcat:2sn2hdpvovczxkifo5zrgggz5a

Software Engineering

Boehm
1976 IEEE transactions on computers  
Here are some excerpts: 1. Testable Requirements "A requirements spec was generated. It has a number of untestable requirements, with phrases like 'appropriate response' all too common.  ...  SOME SOFTWARE ENGINEERING LESSONS LEARNED Recently, I reviewed a paper which succinctly summarized many of the software engineering lessons we have (hopefully) learned over the past few years.  ...  "mechanism" and not pin down precisely what it means). 3.  ... 
doi:10.1109/tc.1976.1674590 fatcat:7jp6tberjja43lsqdi6yhhksqa

Background and Definitions [chapter]

2015 Treatment of High-Risk Sexual Offenders  
Our Space Commercialization Experts Panel (SCEP) earned special thanks for guiding the study to fruition, and for helping to develop its findings and recommendations.  ...  U.S. national security and foreign policy interests.  ...  For example, there are fluid mechanics and transport phenomena that can be observed in the microgravity environment of space that are masked on earth. 32 In addition, some areas of biological research  ... 
doi:10.1002/9781118980132.ch1 fatcat:3jjpgq3vnrgjrdru3xcvyd6eaa

Children Immigration in the Catalan Parliamentary Debate: The Empty Set

Marta Poblet, Joan Josep Vallbé
2011 Cultura, Lenguaje y Representación  
Catalonia has received an unprecedented number of unaccompanied foreign children throughout the past decades, most of them from Morocco.  ...  By analyzing a textual corpus of parliamentary texts, the article concludes that the set of parliamentary activities covering the issue of unaccompanied children contains no elements to ground a substantial  ...  Antònia Martí from CLIC (Centre de Llenguatge i Computació, http://clic.ub.edu/) and Montserrat Nofre from STeL (Servei de Tecnologia Lingüística, http://www.ub.edu/stel/stel.htm), both from the University of  ... 
doi:10.6035/clr.2011.9.6.7 fatcat:ry2depsm35ck5dz6dfmqmjjtey

Burundi: Poverty Reduction Strategy Paper

International Monetary Fund
2007 IMF Staff Country Reports  
financing needs and major sources of financing.  ...  Poverty Reduction Strategy Papers (PRSPs) are prepared by member countries in broad consultation with stakeholders and development partners, including the staffs of the World Bank and the IMF.  ...  Maize and sorghum yields are very low in the wake of problems of varietal degeneration and the lack of security prevailing in some producing regions.  ... 
doi:10.5089/9781451802924.002 fatcat:aco7flde5fdgbcvhtvlhqfvit4

HyperDegrade: From GHz to MHz Effective CPU Frequencies [article]

Alejandro Cabrera Aldaya, Billy Bob Brumley
2021 arXiv   pre-print
In this work, we propose HyperDegrade -- a combination of previous approaches and the use of simultaneous multithreading (SMT) architectures.  ...  We evaluate HyperDegrade on different Intel microarchitectures, yielding significant slowdowns that achieve, in select microbenchmark cases, three orders of magnitude improvement over state-of-the-art.  ...  Specifically, two arenas: automated email decryption, and automated decryption of certificate-related messages.  ... 
arXiv:2101.01077v2 fatcat:bbp5r4rogzdwtenccozu5ma7le

A proposal for collaborative internet-scale trust infrastructures deployment

Massimiliano Pala
2010 Proceedings of the 9th Symposium on Identity and Trust on the Internet - IDTRUST '10  
Today, the need for more interoperable and usable trust infrastructures is urgent in order to fulfill the security needs of computer and mobile devices.  ...  This paper lays down the basis for the deployment of collaborative Internet-scale trust infrastructures.  ...  Some of these systems, like Napster, implemented a centralized search service where a single server keeps track of the location of the shared data.  ... 
doi:10.1145/1750389.1750404 dblp:conf/idtrust/Pala10 fatcat:p6wofi4ecveofhq2lofe25fegq
« Previous Showing results 1 — 15 out of 41 results