A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Protocols for Complex Tasks in Complex Environments
[chapter]
2004
Lecture Notes in Computer Science
The author's research in this area has been supported by generous grants from the NSF ITR and Cybertrust programs, as well as an Alfred P. Sloan Foundation Research Fellowship. ...
One of the most important concerns theory ventured into is of complex environments where different parties are communicating with each other concurrently in many different protocols. ...
of security in that framework, provided powerful tools for building protocols satisfying such definitions. 1 The basic underlying notion of security in the UC framework and its many predecessors is ...
doi:10.1007/978-3-540-30556-9_2
fatcat:n2nwlk546jaoxljp6cdxn6rq7i
Delegated Authenticated Authorization for Constrained Environments
2014
2014 IEEE 22nd International Conference on Network Protocols
Add another complexity level: less-constrained devices for more difficult tasks ...
Goals of an Authenticated Authorization Protocol in Constrained Environments Secure exchange of authorization information Establish DTLS channel between constrained nodes Use only symmetric key cryptography ...
Less-Constrained Level AM and AS act in behalf of their respective owner. Tasks: Obtain the security objectives from their owner. Authenticate the other party. ...
doi:10.1109/icnp.2014.104
dblp:conf/icnp/GerdesBB14
fatcat:kcace4zt5zdahgcknfz6uom6lq
Can universally composable cryptographic protocols be practical?
2015
International Journal of Computer Network and Information Security
The Universal Composability (UC) framework provides provable security guaranties for harsh application environment, where we want to construct protocols which keep security guarantees even when they are ...
for oblivious transfer, [6] for zero knowledge and [27] for commitment task). ...
For an application we refer to secure route acquisition protocols in sensor network environment [33] , [35] , [36] . ...
doi:10.5815/ijcnis.2015.10.03
fatcat:bgtg43fesjfhbdat24ixsvbw5u
A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security
[chapter]
2010
Lecture Notes in Computer Science
What other trusted setups allow UC-secure protocols for all tasks? More generally, given a particular setup, what tasks have UC-secure protocols? ...
It is well-known that most cryptographic tasks do not have universally composable (UC) secure protocols, if no trusted setup is available in the framework. ...
The protocol in Theorem 2 was simplified from its original form in an earlier manuscript, partly motivated by the recent results of [8] . ...
doi:10.1007/978-3-642-14623-7_32
fatcat:3dumwbxy25dond3sfqfevcbvoq
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents
[chapter]
2003
Lecture Notes in Computer Science
In this paper, we present secure route structures and corresponding protocols for mobile agents dispatched in binary to protect the dispatch route information of agents. ...
For the application of large-scale mobile agents in a distributed environment, where a large number of computers are connected together to enable the large-scale sharing of data and computing resources ...
The authors would like to thank the anonymous reviewers for their valuable comments. ...
doi:10.1007/978-3-540-39927-8_3
fatcat:yqvikzuv6fcjddrq6ujlnblp3e
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
[chapter]
2009
Lecture Notes in Computer Science
That is, there exists a sequence of functions f1, f2, . . . such that there exists a UC-secure protocol for fi in the fj -hybrid world if and only if i ≤ j. ...
Essentially, in any adversarial setting (UC, standalone, or passive), f is securely realizable if and only if a very simple (deterministic) "canonical" protocol for f achieves the desired security. ...
Intermediate Complexities. In some security settings, there are only two distinct levels of complexity: the realizable tasks and the complete tasks, with nothing in between. ...
doi:10.1007/978-3-642-00457-5_16
fatcat:jeqaundyarbj3nolybn374266y
T-RBAC based Multi-domain Access Control Method in Cloud
2017
Network Protocols and Algorithms
In order to improve the deficiency of the current multi domain access control in timeliness and flexibility. This paper put forward a dynamic access control policy on the basis of task driving idea. ...
However, traditional access control technology cannot meet the new features of the cloud environment. ...
So it is more suitable for the application in a complex multi-domain environment, to meet the needs of inter-domain secure interoperability. Attribute-Based Approaches. ...
doi:10.5296/npa.v8i4.10411
fatcat:gbmzmnehafd4nhcfgj6s4imike
Modern Symmetric Cryptography methodologies and its applications
[article]
2009
arXiv
pre-print
Designing an unique protocol for Symmetric Cryptography in security networks elements is our focus. Reviewing benefits of using these methodologies has been pre-sented and discussed in this paper. ...
Security-based networks and some complex technologies such as RFID and parallel security settings has been intro-duced by using Symmetric Cryptography is the main base of discussion in this paper. ...
Our main strategy in defining a security base for complex systems is with following steps: Software-based Security(SbS) Hardware-based Security(HbS) Complexity-based Security(CbS) This methodology ...
arXiv:0912.1092v1
fatcat:4jge5tyzdbgg3nwtutounsgur4
Reducing Complexity in Management of eScience Computations
2012
2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
In this paper we address reduction of complexity in management of scientific computations in distributed computing environments. ...
The case study illustrates a viable design pattern for construction of virtual infrastructures for distributed scientific computing. ...
This work is done in collaboration with the High Performance Computing Center North (HPC2N) and is funded by the Swedish National Infrastructure for Computing (SNIC), the Swedish Government's strategic ...
doi:10.1109/ccgrid.2012.72
dblp:conf/ccgrid/OstbergHDEHP12
fatcat:ofeeyjizkzhevfodvx4ofx6z7i
On Secure Workflow Decentralisation on the Internet
2010
Electronic Proceedings in Theoretical Computer Science
We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow ...
can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. ...
Secondly we discuss how these security protocols can provide the foundations for implementing secure core workflow control, data and resource patterns in a distributed environment. ...
doi:10.4204/eptcs.27.2
fatcat:yz6tprmzxfatjioqev26ysukhy
The Grid: Prospects for Application in Metrology
[article]
2011
arXiv
pre-print
as optimal IT platform for assurance of measurement traceability in geographically remote regions and measurement data protection in global networks. ...
The article describes the variety of all possible IE applications within grid technology for the tasks of metrology demanding IT support. ...
In other words, instruments should have minimum software integrating them into the grid, and the complex processing of raw data should be performed in the grid environment. ...
arXiv:1109.6460v1
fatcat:kgbw3h2sq5cppbacqn4uv66ydy
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
2006
Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems - AAMAS '06
This class contains the protocols in which each host on the agent's route is responsible for providing a security function, and, inter alia, includes a big variety of integrity checking schemas and accountability ...
For this purpose we developed a performance evaluation framework, which, as we realised, with certain adjustments, can be applied to evaluate performance of a whole class of security protocols for mobile ...
This class contains the protocols in which each host on agent's route is responsible for providing a security function. ...
doi:10.1145/1160633.1160824
dblp:conf/atal/LeszczynaG06
fatcat:cjkqqhegonfkfdnfo74kjf4yjy
On Classical Cryptographic Protocols in Post-Quantum World
2017
International Journal of Computer Network and Information Security
In post-quantum approach, we consider classical (non-quantum) protocols and primitives which are run by honest parties on classical computers and our aim is to keep their security in an environment where ...
In particular, even a harder goal is set by requiring provable security guaranties in a concurrent running environment as we aim computational UC-security. ...
(Note the idea of non-information oracle is not complexity specific it can work also in quantum environment.) ii). ...
doi:10.5815/ijcnis.2017.08.01
fatcat:pje7deeesvfhzhopt3dm5o7jhq
Towards a Flexible Intra-Trustcenter Management Protocol
[article]
2004
arXiv
pre-print
This paper proposes the Intra Trustcenter Protocol (ITP), a flexible and secure management protocol for communication between arbitrary trustcenter components. ...
In addition it includes an extension mechanism to be prepared for future developments. ...
Future Work We proposed ITP, an XML-based protocol for intra-trustcenter communication. ...
arXiv:cs/0411067v1
fatcat:rsvy23smgrg3nbmwrw43wxciwy
EDA for secure and dependable cybercars
2012
Proceedings of the 49th Annual Design Automation Conference on - DAC '12
The arrival of cybercars calls for novel abstractions, models, protocols, design methodologies, testing and evaluation tools to automate the integration and analysis of the safety and security requirements ...
On one hand, many challenges arise due to increasing system complexity as well as new functionalities that should jointly work on the existing legacy protocols and technologies; such systems are likely ...
If correct timing models and abstractions are available, it is possible to set up a simulation tool which can model the behavior of tasks and their interactions in a complex environments. ...
doi:10.1145/2228360.2228402
dblp:conf/dac/KoushanfarSS12
fatcat:nmd4ynfowzaz3bvudgv3j7oji4
« Previous
Showing results 1 — 15 out of 176,404 results