176,404 Hits in 3.6 sec

Secure Protocols for Complex Tasks in Complex Environments [chapter]

Amit Sahai
2004 Lecture Notes in Computer Science  
The author's research in this area has been supported by generous grants from the NSF ITR and Cybertrust programs, as well as an Alfred P. Sloan Foundation Research Fellowship.  ...  One of the most important concerns theory ventured into is of complex environments where different parties are communicating with each other concurrently in many different protocols.  ...  of security in that framework, provided powerful tools for building protocols satisfying such definitions. 1 The basic underlying notion of security in the UC framework and its many predecessors is  ... 
doi:10.1007/978-3-540-30556-9_2 fatcat:n2nwlk546jaoxljp6cdxn6rq7i

Delegated Authenticated Authorization for Constrained Environments

Stefanie Gerdes, Olaf Bergmann, Carsten Bormann
2014 2014 IEEE 22nd International Conference on Network Protocols  
Add another complexity level: less-constrained devices for more difficult tasks  ...  Goals of an Authenticated Authorization Protocol in Constrained Environments Secure exchange of authorization information Establish DTLS channel between constrained nodes Use only symmetric key cryptography  ...  Less-Constrained Level AM and AS act in behalf of their respective owner. Tasks: Obtain the security objectives from their owner. Authenticate the other party.  ... 
doi:10.1109/icnp.2014.104 dblp:conf/icnp/GerdesBB14 fatcat:kcace4zt5zdahgcknfz6uom6lq

Can universally composable cryptographic protocols be practical?

István Vajda
2015 International Journal of Computer Network and Information Security  
The Universal Composability (UC) framework provides provable security guaranties for harsh application environment, where we want to construct protocols which keep security guarantees even when they are  ...  for oblivious transfer, [6] for zero knowledge and [27] for commitment task).  ...  For an application we refer to secure route acquisition protocols in sensor network environment [33] , [35] , [36] .  ... 
doi:10.5815/ijcnis.2015.10.03 fatcat:bgtg43fesjfhbdat24ixsvbw5u

A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security [chapter]

Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2010 Lecture Notes in Computer Science  
What other trusted setups allow UC-secure protocols for all tasks? More generally, given a particular setup, what tasks have UC-secure protocols?  ...  It is well-known that most cryptographic tasks do not have universally composable (UC) secure protocols, if no trusted setup is available in the framework.  ...  The protocol in Theorem 2 was simplified from its original form in an earlier manuscript, partly motivated by the recent results of [8] .  ... 
doi:10.1007/978-3-642-14623-7_32 fatcat:3dumwbxy25dond3sfqfevcbvoq

Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents [chapter]

Yan Wang, Chi-Hung Chi, Tieyan Li
2003 Lecture Notes in Computer Science  
In this paper, we present secure route structures and corresponding protocols for mobile agents dispatched in binary to protect the dispatch route information of agents.  ...  For the application of large-scale mobile agents in a distributed environment, where a large number of computers are connected together to enable the large-scale sharing of data and computing resources  ...  The authors would like to thank the anonymous reviewers for their valuable comments.  ... 
doi:10.1007/978-3-540-39927-8_3 fatcat:yqvikzuv6fcjddrq6ujlnblp3e

Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation [chapter]

Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2009 Lecture Notes in Computer Science  
That is, there exists a sequence of functions f1, f2, . . . such that there exists a UC-secure protocol for fi in the fj -hybrid world if and only if i ≤ j.  ...  Essentially, in any adversarial setting (UC, standalone, or passive), f is securely realizable if and only if a very simple (deterministic) "canonical" protocol for f achieves the desired security.  ...  Intermediate Complexities. In some security settings, there are only two distinct levels of complexity: the realizable tasks and the complete tasks, with nothing in between.  ... 
doi:10.1007/978-3-642-00457-5_16 fatcat:jeqaundyarbj3nolybn374266y

T-RBAC based Multi-domain Access Control Method in Cloud

Dapeng Xiong, Liang Chen
2017 Network Protocols and Algorithms  
In order to improve the deficiency of the current multi domain access control in timeliness and flexibility. This paper put forward a dynamic access control policy on the basis of task driving idea.  ...  However, traditional access control technology cannot meet the new features of the cloud environment.  ...  So it is more suitable for the application in a complex multi-domain environment, to meet the needs of inter-domain secure interoperability. Attribute-Based Approaches.  ... 
doi:10.5296/npa.v8i4.10411 fatcat:gbmzmnehafd4nhcfgj6s4imike

Modern Symmetric Cryptography methodologies and its applications [article]

Amin Daneshmand Malayeri, Jalal Abdollahi
2009 arXiv   pre-print
Designing an unique protocol for Symmetric Cryptography in security networks elements is our focus. Reviewing benefits of using these methodologies has been pre-sented and discussed in this paper.  ...  Security-based networks and some complex technologies such as RFID and parallel security settings has been intro-duced by using Symmetric Cryptography is the main base of discussion in this paper.  ...  Our main strategy in defining a security base for complex systems is with following steps:  Software-based Security(SbS)  Hardware-based Security(HbS)  Complexity-based Security(CbS) This methodology  ... 
arXiv:0912.1092v1 fatcat:4jge5tyzdbgg3nwtutounsgur4

Reducing Complexity in Management of eScience Computations

Per-Olov Östberg, Andreas Hellander, Brian Drawert, Erik Elmroth, Sverker Holmgren, Linda Petzold
2012 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)  
In this paper we address reduction of complexity in management of scientific computations in distributed computing environments.  ...  The case study illustrates a viable design pattern for construction of virtual infrastructures for distributed scientific computing.  ...  This work is done in collaboration with the High Performance Computing Center North (HPC2N) and is funded by the Swedish National Infrastructure for Computing (SNIC), the Swedish Government's strategic  ... 
doi:10.1109/ccgrid.2012.72 dblp:conf/ccgrid/OstbergHDEHP12 fatcat:ofeeyjizkzhevfodvx4ofx6z7i

On Secure Workflow Decentralisation on the Internet

Petteri Kaskenpalo
2010 Electronic Proceedings in Theoretical Computer Science  
We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow  ...  can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols.  ...  Secondly we discuss how these security protocols can provide the foundations for implementing secure core workflow control, data and resource patterns in a distributed environment.  ... 
doi:10.4204/eptcs.27.2 fatcat:yz6tprmzxfatjioqev26ysukhy

The Grid: Prospects for Application in Metrology [article]

P.I.Neyezhmakov, S.I.Zub, S.S.Zub
2011 arXiv   pre-print
as optimal IT platform for assurance of measurement traceability in geographically remote regions and measurement data protection in global networks.  ...  The article describes the variety of all possible IE applications within grid technology for the tasks of metrology demanding IT support.  ...  In other words, instruments should have minimum software integrating them into the grid, and the complex processing of raw data should be performed in the grid environment.  ... 
arXiv:1109.6460v1 fatcat:kgbw3h2sq5cppbacqn4uv66ydy

Performance analysis of untraceability protocols for mobile agents using an adaptable framework

Rafał Leszczyna, Janusz Górski
2006 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems - AAMAS '06  
This class contains the protocols in which each host on the agent's route is responsible for providing a security function, and, inter alia, includes a big variety of integrity checking schemas and accountability  ...  For this purpose we developed a performance evaluation framework, which, as we realised, with certain adjustments, can be applied to evaluate performance of a whole class of security protocols for mobile  ...  This class contains the protocols in which each host on agent's route is responsible for providing a security function.  ... 
doi:10.1145/1160633.1160824 dblp:conf/atal/LeszczynaG06 fatcat:cjkqqhegonfkfdnfo74kjf4yjy

On Classical Cryptographic Protocols in Post-Quantum World

István Vajda
2017 International Journal of Computer Network and Information Security  
In post-quantum approach, we consider classical (non-quantum) protocols and primitives which are run by honest parties on classical computers and our aim is to keep their security in an environment where  ...  In particular, even a harder goal is set by requiring provable security guaranties in a concurrent running environment as we aim computational UC-security.  ...  (Note the idea of non-information oracle is not complexity specific it can work also in quantum environment.) ii).  ... 
doi:10.5815/ijcnis.2017.08.01 fatcat:pje7deeesvfhzhopt3dm5o7jhq

Towards a Flexible Intra-Trustcenter Management Protocol [article]

V. Karatsiolis, M. Lippert, A. Wiesmaier, A. Pitaev, M. Ruppert, J. Buchmann
2004 arXiv   pre-print
This paper proposes the Intra Trustcenter Protocol (ITP), a flexible and secure management protocol for communication between arbitrary trustcenter components.  ...  In addition it includes an extension mechanism to be prepared for future developments.  ...  Future Work We proposed ITP, an XML-based protocol for intra-trustcenter communication.  ... 
arXiv:cs/0411067v1 fatcat:rsvy23smgrg3nbmwrw43wxciwy

EDA for secure and dependable cybercars

Farinaz Koushanfar, Ahmad-Reza Sadeghi, Hervé Seudie
2012 Proceedings of the 49th Annual Design Automation Conference on - DAC '12  
The arrival of cybercars calls for novel abstractions, models, protocols, design methodologies, testing and evaluation tools to automate the integration and analysis of the safety and security requirements  ...  On one hand, many challenges arise due to increasing system complexity as well as new functionalities that should jointly work on the existing legacy protocols and technologies; such systems are likely  ...  If correct timing models and abstractions are available, it is possible to set up a simulation tool which can model the behavior of tasks and their interactions in a complex environments.  ... 
doi:10.1145/2228360.2228402 dblp:conf/dac/KoushanfarSS12 fatcat:nmd4ynfowzaz3bvudgv3j7oji4
« Previous Showing results 1 — 15 out of 176,404 results