A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Formal analysis of some secure procedures for certificate delivery
2006
Software testing, verification & reliability
The formal analysis is carried out by means of a software tool for the automatic verification of cryptographic protocols with finite behaviour. ...
The paper describes and formally analyzes two communication protocols to manage the secure emission of digital certificates. ...
-The application of automated verification tools is useful to better understand how certain mechanisms and checks ensure certain security features of communication protocols. ...
doi:10.1002/stvr.329
fatcat:2q4goyyfuzfzxgk3poexdh2xja
How to survive identity management in the Industry 4.0 era
2021
IEEE Access
mechanisms of the SCEP message exchange. ...
As the proposed security mechanism is designed like a wrapper around the standard SCEP protocol, it can be easily implemented and deployed. ...
doi:10.1109/access.2021.3092203
fatcat:x555a7vwv5g5xlydxmxmvtn4yq
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol
[chapter]
1999
Lecture Notes in Computer Science
To construct a highly-assured implementation of secure communication channels we must have clear definitions of the security services, the channels, and under what assumptions these channels provide the ...
We formally define secure channel services and develop a detailed example. The example is a core protocol common to a family of secure email systems. ...
This will likely require a reformulation of confidentiality as it relates to implementation. ...
doi:10.1007/3-540-48119-2_42
fatcat:xaucsuit5ngstdkjv2ueobxiva
Dynamic Validity Period Calculation of Digital Certificates Based on Aggregated Security Assessment
2012
International Journal on Cryptography and Information Security
This kind of security assessment can be executed periodically in order to dynamically respond to changing conditions. ...
The paper proposes a method based on different security-related factors to dynamically calculate the validity period of digital certificates. ...
Below some basics of manual assessments and a new concept for a pragmatic automated process is discussed. ...
doi:10.5121/ijcis.2012.2401
fatcat:74eughgbmbck7fafqcmh6aplfy
Finding the PKI needles in the Internet haystack
2010
Journal of Computer Security
This issue impacts especially on the usability of this technology and the interoperability of PKIs in open environments such as the Internet. ...
In this paper, we present the design and prototype of a new and flexible solution for automatic discovery of the services and data repositories made available by a Certificate Service Provider (CSP). ...
This work was supported in part by the NSF (under Grant CNS-0448499), the US Department of Homeland Security (under Grant Award No. 2006-CS-001-000001) and Sun Microsystems. ...
doi:10.3233/jcs-2010-0401
fatcat:toixn6rwnjh6xgfm6pova5ksle
NATO-EU Cooperation on C4ISR Capabilities for Crisis Management
2011
Information & Security An International Journal
and to avoid or alleviate the consequences of natural or man-made disasters. ...
the key driver to overcome the political issues that still undermine NATO and EU cooperation and therefore a pragmatic approach to pooling and sharing of capabilities, thus preventing duplication of efforts ...
Some of NATO SPS and EU FP7 platform's activities directly address Crisis Management, such as SPS's defence-related environmental issues, environmental security, eco-terrorism countermeasures, disaster ...
doi:10.11610/isij.2705
fatcat:zqbmhjydafb3zpami7hbuvrtdi
The EuroPKI Experience
[chapter]
2004
Lecture Notes in Computer Science
The article closes with an overview of the EuroPKI activity plans and perspective. ...
This paper discusses the technical and management experience gained in the day-by-day operation of the EuroPKI infrastructure. ...
Bucharest, Provincia di Macerata, PWR Centre for Networking and Supercomputing, SETCCE, University of Modena and Reggio Emilia) as well as the past ones and every partner of the ICE-TEL, ICE-CAR and NASTEC ...
doi:10.1007/978-3-540-25980-0_2
fatcat:kafej5vorzhabe75ljcixsa3q4
CYBERSPACESE CURITY RELEVANCE IN THE TIME OF WEB 2.0
2011
CONTEMPORARY MILITARY CHALLENGES
In the paper, importance of the cyberspace has been analysed by security theories and with special focus on the Web 2.0 and WikiLeaks issue. ...
The current way of such interactive communication is namely based on individuals as data and information producers, which could be in (Western) countries perceived as a greater challenge and in some cases ...
challenge and in some cases even national security threat. ...
doi:10.33179/bsv.99.svi.11.cmc.13.3.2
fatcat:7j7kibuxsngzzhftgjizajifiq
Background and Definitions
[chapter]
2013
Modern Geopolitics and Security
Our Space Commercialization Experts Panel (SCEP) earned special thanks for guiding the study to fruition, and for helping to develop its findings and recommendations. ...
U.S. national security and foreign policy interests. ...
For example, there are fluid mechanics and transport phenomena that can be observed in the microgravity environment of space that are masked on earth. 32 In addition, some areas of biological research ...
doi:10.1201/b16082-2
fatcat:2sn2hdpvovczxkifo5zrgggz5a
Software Engineering
1976
IEEE transactions on computers
Here are some excerpts: 1. Testable Requirements "A requirements spec was generated. It has a number of untestable requirements, with phrases like 'appropriate response' all too common. ...
SOME SOFTWARE ENGINEERING LESSONS LEARNED Recently, I reviewed a paper which succinctly summarized many of the software engineering lessons we have (hopefully) learned over the past few years. ...
"mechanism" and not pin down precisely what it means). 3. ...
doi:10.1109/tc.1976.1674590
fatcat:7jp6tberjja43lsqdi6yhhksqa
Background and Definitions
[chapter]
2015
Treatment of High-Risk Sexual Offenders
Our Space Commercialization Experts Panel (SCEP) earned special thanks for guiding the study to fruition, and for helping to develop its findings and recommendations. ...
U.S. national security and foreign policy interests. ...
For example, there are fluid mechanics and transport phenomena that can be observed in the microgravity environment of space that are masked on earth. 32 In addition, some areas of biological research ...
doi:10.1002/9781118980132.ch1
fatcat:3jjpgq3vnrgjrdru3xcvyd6eaa
Children Immigration in the Catalan Parliamentary Debate: The Empty Set
2011
Cultura, Lenguaje y Representación
Catalonia has received an unprecedented number of unaccompanied foreign children throughout the past decades, most of them from Morocco. ...
By analyzing a textual corpus of parliamentary texts, the article concludes that the set of parliamentary activities covering the issue of unaccompanied children contains no elements to ground a substantial ...
Antònia Martí from CLIC (Centre de Llenguatge i Computació, http://clic.ub.edu/) and Montserrat Nofre from STeL (Servei de Tecnologia Lingüística, http://www.ub.edu/stel/stel.htm), both from the University of ...
doi:10.6035/clr.2011.9.6.7
fatcat:ry2depsm35ck5dz6dfmqmjjtey
Burundi: Poverty Reduction Strategy Paper
2007
IMF Staff Country Reports
financing needs and major sources of financing. ...
Poverty Reduction Strategy Papers (PRSPs) are prepared by member countries in broad consultation with stakeholders and development partners, including the staffs of the World Bank and the IMF. ...
Maize and sorghum yields are very low in the wake of problems of varietal degeneration and the lack of security prevailing in some producing regions. ...
doi:10.5089/9781451802924.002
fatcat:aco7flde5fdgbcvhtvlhqfvit4
HyperDegrade: From GHz to MHz Effective CPU Frequencies
[article]
2021
arXiv
pre-print
In this work, we propose HyperDegrade -- a combination of previous approaches and the use of simultaneous multithreading (SMT) architectures. ...
We evaluate HyperDegrade on different Intel microarchitectures, yielding significant slowdowns that achieve, in select microbenchmark cases, three orders of magnitude improvement over state-of-the-art. ...
Specifically, two arenas: automated email decryption, and automated decryption of certificate-related messages. ...
arXiv:2101.01077v2
fatcat:bbp5r4rogzdwtenccozu5ma7le
A proposal for collaborative internet-scale trust infrastructures deployment
2010
Proceedings of the 9th Symposium on Identity and Trust on the Internet - IDTRUST '10
Today, the need for more interoperable and usable trust infrastructures is urgent in order to fulfill the security needs of computer and mobile devices. ...
This paper lays down the basis for the deployment of collaborative Internet-scale trust infrastructures. ...
Some of these systems, like Napster, implemented a centralized search service where a single server keeps track of the location of the shared data. ...
doi:10.1145/1750389.1750404
dblp:conf/idtrust/Pala10
fatcat:p6wofi4ecveofhq2lofe25fegq
« Previous
Showing results 1 — 15 out of 41 results