BP-XACML an Authorisation Policy Language for Business Processes (Englisch)
- Neue Suche nach: Alissa, Khalid
- Neue Suche nach: Reid, Jason
- Neue Suche nach: Dawson, Ed
- Neue Suche nach: Salim, Farzad
- Neue Suche nach: Foo, Ernest
- Weitere Informationen zu Foo, Ernest:
- https://orcid.org/https://orcid.org/0000-0002-3971-6415
- Neue Suche nach: Stebila, Douglas
- Neue Suche nach: Alissa, Khalid
- Neue Suche nach: Reid, Jason
- Neue Suche nach: Dawson, Ed
- Neue Suche nach: Salim, Farzad
In:
Information Security and Privacy
: 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings
;
Kapitel: 18
;
307-325
;
2015
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:BP-XACML an Authorisation Policy Language for Business Processes
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Foo, Ernest ( Herausgeber:in ) / Stebila, Douglas ( Herausgeber:in ) / Alissa, Khalid ( Autor:in ) / Reid, Jason ( Autor:in ) / Dawson, Ed ( Autor:in ) / Salim, Farzad ( Autor:in )
-
Kongress:Australasian Conference on Information Security and Privacy ; 2015 ; Brisbane, QLD, Australia
-
Erschienen in:Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings ; Kapitel: 18 ; 307-325Lecture Notes in Computer Science ; 9144 ; 307-325Security and Cryptology ; 307-325
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:25.06.2015
-
Format / Umfang:19 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering SchemesSun, Zhelei / Wang, Peng / Zhang, Liting et al. | 2015
- 2
-
Cryptanalysis of Reduced-Round WhirlwindMa, Bingke / Li, Bao / Hao, Ronglin / Li, Xiaoqian et al. | 2015
- 3
-
Improving the Biclique Cryptanalysis of AESTao, Biaoshuai / Wu, Hongjun et al. | 2015
- 4
-
A New General Framework for Secure Public Key Encryption with Keyword SearchChen, Rongmao / Mu, Yi / Yang, Guomin / Guo, Fuchun / Wang, Xiaofen et al. | 2015
- 5
-
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static AssumptionsSakai, Yusuke / Emura, Keita / Schuldt, Jacob C.N. / Hanaoka, Goichiro / Ohta, Kazuo et al. | 2015
- 6
-
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length MessageBansal, Tarun Kumar / Chang, Donghoon / Sanadhya, Somitra Kumar et al. | 2015
- 7
-
Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNSNegre, Christophe / Perin, Guilherme et al. | 2015
- 8
-
Towards Forward Security Properties for PEKS and IBETang, Qiang et al. | 2015
- 9
-
IBE Under \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k$$\end{document}-LIN with Shorter Ciphertexts and Private KeysKurosawa, Kaoru / Phong, Le Trieu et al. | 2015
- 10
-
Improved Identity-Based Online/Offline EncryptionLai, Jianchang / Mu, Yi / Guo, Fuchun / Susilo, Willy et al. | 2015
- 11
-
Constructions of CCA-Secure Revocable Identity-Based EncryptionIshida, Yuu / Watanabe, Yohei / Shikata, Junji et al. | 2015
- 12
-
Linkable Message Tagging: Solving the Key Distribution Problem of Signature SchemesGünther, Felix / Poettering, Bertram et al. | 2015
- 13
-
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage ResiliencyWang, Yuyu / Tanaka, Keisuke et al. | 2015
- 14
-
Constant Size Ring Signature Without Random OracleBose, Priyanka / Das, Dipanjan / Rangan, Chandrasekharan Pandu et al. | 2015
- 15
-
Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent AssumptionZhang, Tingting / Li, Hongda / Huang, Guifang et al. | 2015
- 16
-
Modelling Ciphersuite and Version Negotiation in the TLS ProtocolDowling, Benjamin / Stebila, Douglas et al. | 2015
- 17
-
VisRAID: Visualizing Remote Access for Intrusion DetectionTrethowen, Leliel / Anslow, Craig / Marshall, Stuart / Welch, Ian et al. | 2015
- 18
-
BP-XACML an Authorisation Policy Language for Business ProcessesAlissa, Khalid / Reid, Jason / Dawson, Ed / Salim, Farzad et al. | 2015
- 19
-
How TKIP Induces Biases of Internal States of Generic RC4Ito, Ryoma / Miyaji, Atsuko et al. | 2015
- 20
-
Preventing Fault Attacks Using Fault Randomization with a Case Study on AESGhosh, Shamit / Saha, Dhiman / Sengupta, Abhrajit / Roy Chowdhury, Dipanwita et al. | 2015
- 21
-
Analysis of Rainbow Tables with FingerprintsAvoine, Gildas / Bourgeois, Adrien / Carpent, Xavier et al. | 2015
- 22
-
A New Public Remote Integrity Checking Scheme with User PrivacyFeng, Yiteng / Mu, Yi / Yang, Guomin / Liu, Joseph K. et al. | 2015
- 23
-
Efficient Dynamic Provable Data Possession with Public Verifiability and Data PrivacyGritti, Clémentine / Susilo, Willy / Plantard, Thomas et al. | 2015
- 24
-
Privately Computing Set-Union and Set-Intersection Cardinality via Bloom FiltersEgert, Rolf / Fischlin, Marc / Gens, David / Jacob, Sven / Senker, Matthias / Tillmanns, Jörn et al. | 2015
- 25
-
Generalizing PMAC Under Weaker AssumptionsDatta, Nilanjan / Yasuda, Kan et al. | 2015
- 26
-
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained DevicesAgrawal, Megha / Chang, Donghoon / Sanadhya, Somitra et al. | 2015
- 27
-
Secure Statistical Analysis Using RLWE-Based Homomorphic EncryptionYasuda, Masaya / Shimoyama, Takeshi / Kogure, Jun / Yokoyama, Kazuhiro / Koshiba, Takeshi et al. | 2015
- 28
-
Bad Directions in Cryptographic Hash FunctionsBernstein, Daniel J. / Hülsing, Andreas / Lange, Tanja / Niederhagen, Ruben et al. | 2015