Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies (Englisch)
- Neue Suche nach: Schlegel, Marius
- Neue Suche nach: Amthor, Peter
- Neue Suche nach: Schlegel, Marius
- Neue Suche nach: Amthor, Peter
In:
SECRYPT 2020
; 423-434
;
2020
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies
-
Beteiligte:Schlegel, Marius ( Autor:in ) / Amthor, Peter ( Autor:in )
-
Kongress:SECRYPT ; 17. ; 2020 ; Online
-
Erschienen in:SECRYPT 2020 ; 423-434
-
Verlag:
- Neue Suche nach: SCITEPRESS - Science and Technology Publications, Lda.
-
Erscheinungsort:[Setúbal]
-
Erscheinungsdatum:2020
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38 / 54.62
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 5
-
Enterprise Systems Architecture - EssentialsProper, Henderik A. et al. | 2020
- 7
-
eHealth Monitoring Using Wireless Communication Protocols and Intelligent SystemsLlore, Jaime et al. | 2020
- 9
-
Industry 4.0: Challenges from a Data Science PerspectiveAbraham, Ajith et al. | 2020
- 11
-
Secure Computation Protocol: A Technology for Our TimeYung, Moti et al. | 2020
- 13
-
Analysing Digital Footprints to Infer the Health of Populations and IndividualsCox, Ingemar Johansson et al. | 2020
- 19
-
Helper-in-the-Middle: Supporting Web Application Scanners Targeting Industrial Control SystemsBorcherding, Anne / Pfrang, Steffen / Haas, Christian / Weiche, Albrecht / Beyerer, Jürgen et al. | 2020
- 31
-
Termination of Ethereum's Smart ContractsGenet, Thomas / Jensen, Thomas / Sauvage, Justine et al. | 2020
- 44
-
Avoiding Network and Host Detection using Packet Bit-maskingStergiopoulos, George / Lygerou, Eirini / Tsalis, Nikolaos / Tomaras, Dimitris / Gritzalis, Dimitris et al. | 2020
- 56
-
FPGA-based McEliece Cryptosystem using Non-linear Convolutional CodesSone, Michael Ekonde et al. | 2020
- 68
-
CROOT: Code-based Round-Optimal Oblivious TransferAragon, Nicolas / Blazy, Olivier / Fournaise, Neals / Gaborit, Philippe et al. | 2020
- 78
-
DCBC: A Distributed High-performance Block-Cipher Mode of OperationTrabelsi, Oussama / Sfaxi, Lilia / Robbana, Riadh et al. | 2020
- 90
-
Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid SystemsAnisetti, Marco / Ardagna, Claudio A. / Bena, Nicola / Damiani, Ernesto et al. | 2020
- 102
-
An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud DataHammami, Hamza / Obaidat, Mohammad S. / Yahia, Sadok Ben et al. | 2020
- 110
-
Decentralized Multi-Client Attribute Based Functional EncryptionChen, Yuechen / Zhang, Linru / Yiu, Siu-Ming et al. | 2020
- 122
-
Optimal Transport Layer for Secure ComputationBrandt, Markus / Orlandi, Claudio / Shrishak, Kris / Shulman, Haya et al. | 2020
- 134
-
An Identity-matching Process to Strengthen Trust in Federated-identity ArchitecturesMarillonnet, Paul / Ates, Mikaël / Laurent, Maryline / Kaaniche, Nesrine et al. | 2020
- 147
-
Ensuring the Integrity of Outsourced Web ScriptsMignerey, Josselin / Mucchietto, Cyrille / Orfila, Jean-Baptiste et al. | 2020
- 159
-
Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-entropy SecretsSandoval, Itzel Vazquez / Atashpendar, Arash / Lenzini, Gabriele et al. | 2020
- 172
-
FALCO: Detecting Superfluous JavaScript Injection Attacks using Website FingerprintsLiu, Chih-Chun / Hsiao, Hsu-Chun / Kim, Tiffany Hyun-Jin et al. | 2020
- 184
-
Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing ModesKorniotakis, John / Papadopoulos, Panagiotis / Markatos, Evangelos P. et al. | 2020
- 193
-
Practically Efficient Attribute-based Encryption for Compartmented Access StructuresTiplea, Ferucio Laurentiu / lonita, Alexandru / Nica, Anca Maria et al. | 2020
- 205
-
Round-optimal Constant-size Blind SignaturesBlazy, Olivier / Laura, Brouilhet / Chevalier, Céline / Fournaise, Neals et al. | 2020
- 217
-
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance SystemKaaniche, Nesrine / Belguith, Sana / Laurent, Maryline / Gehani, Ashish / Russello, Giovanni et al. | 2020
- 230
-
A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based CryptosystemsBaldi, Marco / Barenghi, Alessandro / Chiaraluce, Franco / Pelosi, Gerardo / Santini, Paolo et al. | 2020
- 245
-
Exploring Current E-mail Cyber Threats using Authenticated SMTP HoneypotZobal, Lukaš / Kolar, Dušan / Kroustek, Jakub et al. | 2020
- 255
-
Optimizing dm-crypt for XTS-AES: Getting the Best of Atmel Cryptographic Co-processorsDemir, Levent / Thiery, Mathieu / Roca, Vincent / Tenkes, Jean-Michel / Roch, Jean-Louis et al. | 2020
- 263
-
cipherPath: Efficient Traversals over Homomorphically Encrypted PathsBramm, Georg / Schütte, Julian et al. | 2020
- 271
-
A White-Box Encryption Scheme using Physically Unclonable FunctionsRasoamiaramanana, Sandra / Minier, Marine / Macario-Rat, Gilles et al. | 2020
- 279
-
Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA NetworksMaynard, Peter / McLaughlin, Kieran et al. | 2020
- 287
-
Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation AwarenessYao, Jing / Zheng, Yifeng / Wang, Cong / Nepal, Surya et al. | 2020
- 294
-
Evasive Windows Malware: Impact on Antiviruses and Possible CountermeasuresHerzog, Cédric / Tong, Valérie Viet Triem / Wilke, Pierre / Straaten, Arnaud Van / Lanet, Jean-Louis et al. | 2020
- 302
-
Security Analysis of ElGamal ImplementationsLaz, Mohamad El / Grégoire, Benjamin / Rezk, Tamara et al. | 2020
- 314
-
Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent HashingObana, Satoshi / Yoshida, Maki et al. | 2020
- 322
-
Signatures to Go: A Framework for Qualified PDF Signing on Mobile DevicesAhmetovic, Emina / Lenz, Thomas / Kollmann, Christian et al. | 2020
- 332
-
Privacy-Preserving Greater-Than Integer Comparison without Binary DecompositionEskeland, Sigurd et al. | 2020
- 341
-
Multi-Stakeholder Cybersecurity Risk Assessment for Data ProtectionMollaeefar, Majid / Siena, Alberto / Ranise, Silvio et al. | 2020
- 349
-
A Novel Anonymous Authentication and Key Agreement Scheme for Smart GridHammami, Hamza / Obaidat, Mohammad S. / Yahia, Sadok Ben et al. | 2020
- 355
-
SENSSE: Simple, Efficient Searchable Symmetric Encryption for Sensor NetworksSpasić, Bojan / Markowitch, Olivier / Thiran, Philippe et al. | 2020
- 364
-
Linear Generalized ElGamal Encryption SchemeLafourcade, Pascal / Robert, Léo / Sow, Demba et al. | 2020
- 372
-
Accelerating Homomorphic Encryption using Approximate Computing TechniquesKhanna, Shabnam / Rafferty, Ciara et al. | 2020
- 380
-
This Selfie Does Not Exist: On the Security of Electroneum Cloud MiningMarsalek, Alexander / Fasilija, Edona / Ziegler, Dominik et al. | 2020
- 389
-
ProteiNN: Privacy-preserving One-to-Many Neural Network ClassificationsBozdemir, Beyza / Ermis, Orhan / Önen, Melek et al. | 2020
- 397
-
Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data SplittingDenis, Nathanael / Chaffardon, Pierre / Conan, Denis / Laurent, Maryline / Chabridon, Sophie / Leneutre, Jean et al. | 2020
- 407
-
Differentially Private Graph Publishing and Randomized Response for Collaborative FilteringSalas, Julián / Torra, Vicenç et al. | 2020
- 415
-
A Machine-learning based Unbiased Phishing Detection ApproachShirazi, Hossein / Zweigle, Landon / Ray, Indrakshi et al. | 2020
- 423
-
Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control PoliciesSchlegel, Marius / Amthor, Peter et al. | 2020
- 435
-
Solving Set Relations with Secure Bloom Filters Keeping Cardinality PrivateTajan, Louis / Westhoff, Dirk / Armknecht, Frederik et al. | 2020
- 443
-
Identity Verification and Fraud Detection During Online Exams with a Privacy Compliant Biometric SystemHaytom, M. A. / Rosenberger, C. / Charrier, C. / Zhu, C. / Regnier, C. et al. | 2020
- 451
-
VIP Blowfish Privacy in Communication GraphsNassar, Mohamed / Chicha, Elie / Bouna, Bechara Al / Chbeir, Richard et al. | 2020
- 460
-
Droppix: Towards More Realistic Video FingerprintingBtaskiewicz, Przemystaw / Klonowski, Marek / Syga, Piotr et al. | 2020
- 469
-
Software Emulation of Quantum Resistant Trusted Platform ModulesFiolhais, Luis / Martins, Paulo / Sousa, Leonel et al. | 2020
- 477
-
Formal Accuracy Analysis of a Biometric Data Transformation and Its Application to Secure Template GenerationAli, Shoukat / Karabina, Koray / Karagoz, Emrah et al. | 2020
- 489
-
SwaNN: Switching among Cryptographic Tools for Privacy-preserving Neural Network PredictionsTillem, Gamze / Bozdemir, Beyza / Önen, Melek et al. | 2020
- 497
-
Deconstructing the Decentralization TrilemmaHalpin, Harry et al. | 2020
- 505
-
Towards Language Support for Model-based Security Policy EngineeringAmthor, Peter / Schlegel, Marius et al. | 2020
- 514
-
Exploiting Hot Spots in Heuristic Safety Analysis of Dynamic Access Control ModelsSchlegel, Marius / Kühnhauser, Winfried E. et al. | 2020
- 527
-
CP-ABE Scheme Satisfying Constant-size Keys based on ECCRaj, Nishant / Pais, Alwyn Roshan et al. | 2020
- 533
-
Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based EncryptionBakshi, Puneet / Nandi, Sukumar et al. | 2020
- 539
-
Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced DecryptionZiegler, Dominik / Marsalek, Alexander / Prünster, Bernd / Sabongui, Josef et al. | 2020
- 545
-
Practical Predicate Encryption for Inner ProductTseng, Yi-Fan / Liu, Zi-Yuan / Tso, Raylin et al. | 2020
- 551
-
Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge DevicesGrande, Elias / Beltrán, Marta et al. | 2020
- 557
-
Under Pressure: Pushing Down on Me — Touch Sensitive Door Handle to Identify Users at Room EntryTietz, Christian / Klieme, Eric / Brabender, Rachel / Lasarow, Teresa / Rambold, Lukas / Meinel, Christoph et al. | 2020
- 564
-
Practical Hash-based Anonymity for MAC AddressesAli, Junade / Dyo, Vladimir et al. | 2020
- 572
-
Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk AssessmentAouad, Lamine / Asghar, Muhammad Rizwan et al. | 2020
- 579
-
Performance Comparison of Two Generic MPC-frameworks with Symmetric CiphersLorünser, Thomas / Wohner, Florian et al. | 2020
- 587
-
A Fine-grained Access Control Model for Knowledge GraphsValzelli, Marco / Maurino, Andrea / Palmonari, Matteo et al. | 2020
- 594
-
A Trend-following Trading Indicator on Homomorphically Encrypted DataWeng, Haotian / Lenskiy, Artem et al. | 2020
- 600
-
SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacksBelguith, Sana / Asghar, Muhammad Rizwan / Wang, Song / Gomez, Karina / Russello, Giovanni et al. | 2020
- 610
-
QSOR: Quantum-safe Onion RoutingTujner, Zsolt / Rooijakkers, Thomas / Heesch, Maran van / Önen, Melek et al. | 2020
- 617
-
Attribute-Based Encryption and Its Application to a Software-Distributed Shared MemoryStan, Oana / Cudennec, Loíc / Syoen, Louis et al. | 2020
- 624
-
Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measureNegre, Christophe et al. | 2020
- 630
-
Providing Secured Access Delegation in Identity Management SystemsShehu, Abubakar-Sadig / Pinto, Anténio / Correia, Manuel E. et al. | 2020
- 637
-
An Innovative Self-Healing Approach with STIX Data UtilisationSpyros, Arnolnt / Rantos, Konstantinos / Papanikolaou, Alexandros / Ilioudis, Christos et al. | 2020
- 644
-
A Comprehensive Quantified Approach for Security Risk Management in e-Health SystemsKsibi, Sondes / Jaidi, Faouzi / Bouhoula, Adel et al. | 2020