Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Hartog, Jeremy"'
Publikováno v:
Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust 2015, 1-23
STARTPAGE=1;ENDPAGE=23;TITLE=Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust 2015
STARTPAGE=1;ENDPAGE=23;TITLE=Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust 2015
The protection of sensitive information is of utmost importance for organizations. The complexity and dynamism of modern businesses are forcing a re-think of traditional protection mechanisms. In particular, a priori policy en-forcement mechanisms ar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::5c40e936f80579c5164a67fe1ca3d432
https://research.utwente.nl/en/publications/auditing-with-incomplete-logs(9ed1927f-2293-470e-a5d1-199bfb7e8056).html
https://research.utwente.nl/en/publications/auditing-with-incomplete-logs(9ed1927f-2293-470e-a5d1-199bfb7e8056).html
Autor:
Czenko, Marcin, Tran, Ha, Doumen, Jeroen M., Etalle, Sandro, Hartel, Pieter, den Hartog, Jeremy, Mauw, Sjouke, Issarny, Valérie, Cremers, Cas
Publikováno v:
1st Int. Workshop on Security and Trust Management (STM), 113-130
STARTPAGE=113;ENDPAGE=130;TITLE=1st Int. Workshop on Security and Trust Management (STM)
Proceedings of the First International Workshop on Security and Trust Management (STM'05, Milan, Italy, September 15, 2005), 113-130
STARTPAGE=113;ENDPAGE=130;TITLE=Proceedings of the First International Workshop on Security and Trust Management (STM'05, Milan, Italy, September 15, 2005)
STARTPAGE=113;ENDPAGE=130;TITLE=1st Int. Workshop on Security and Trust Management (STM)
Proceedings of the First International Workshop on Security and Trust Management (STM'05, Milan, Italy, September 15, 2005), 113-130
STARTPAGE=113;ENDPAGE=130;TITLE=Proceedings of the First International Workshop on Security and Trust Management (STM'05, Milan, Italy, September 15, 2005)
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management languages such as the family of Role Based Trust Management languages (RT). T
Publikováno v:
28th Annual IFIP WG 11.3 Working ConferenceData and Applications Security and Privacy (DBSec), 243-259
STARTPAGE=243;ENDPAGE=259;TITLE=28th Annual IFIP WG 11.3 Working ConferenceData and Applications Security and Privacy (DBSec)
STARTPAGE=243;ENDPAGE=259;TITLE=28th Annual IFIP WG 11.3 Working ConferenceData and Applications Security and Privacy (DBSec)
Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach represents a major leap forward w.r.t. pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::3bcdf5dc603a6412b39dff6b7239e4cf
https://research.utwente.nl/en/publications/90ac4948-3282-471d-8610-0263564b9b25
https://research.utwente.nl/en/publications/90ac4948-3282-471d-8610-0263564b9b25
Autor:
Spiessens, F., den Hartog, Jeremy, Etalle, Sandro, Degano, P., Guttman, J. D., Martinelli, F.
Publikováno v:
Formal Aspects in Security and Trust, 5th International Workshop, 129-142
STARTPAGE=129;ENDPAGE=142;TITLE=Formal Aspects in Security and Trust, 5th International Workshop
STARTPAGE=129;ENDPAGE=142;TITLE=Formal Aspects in Security and Trust, 5th International Workshop
In Decentralized Trust Management (DTM) authorization decisions are made by multiple principals who can also delegate decisions to each other. Therefore, a policy change of one principal will often affect who gets authorized by another principal. In
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::ae52edab594578adbab19cf579999294
https://research.utwente.nl/en/publications/03c967a2-b274-4e4c-ab5a-5565e920b382
https://research.utwente.nl/en/publications/03c967a2-b274-4e4c-ab5a-5565e920b382
Autor:
den Hartog, Jeremy
In [Corin, den Hartog in ICALP 2006] we build a formal verification technique for game based correctness proofs of cryptograhic algorithms based on a probabilistic Hoare style logic [den Hartog, de Vink in IJFCS 13(3), 2002]. An important step toward
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::004f29d0dd2846235699ac38af0f86f7
https://research.utwente.nl/en/publications/towards-mechanized-correctness-proofs-for-cryptographic-algorithms-axiomatization-of-a-probabilistic-hoare-style-logic(481ec516-8f84-4d0b-ae18-fcb6b21f3408).html
https://research.utwente.nl/en/publications/towards-mechanized-correctness-proofs-for-cryptographic-algorithms-axiomatization-of-a-probabilistic-hoare-style-logic(481ec516-8f84-4d0b-ae18-fcb6b21f3408).html
Traditionally, medical data is stored and processed using paper-based files. Recently, medical facilities have started to store, access and exchange medical data in digital form. The drivers for this change are mainly demands for cost reduction, and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::72f0a6f8517daf42b5a4b828d430f6d7
https://research.tue.nl/nl/publications/d9763235-978f-4925-ab16-62d82dd74905
https://research.tue.nl/nl/publications/d9763235-978f-4925-ab16-62d82dd74905
Publikováno v:
Security, Privacy, and Trust in Modern Data Management, 383-397
STARTPAGE=383;ENDPAGE=397;TITLE=Security, Privacy, and Trust in Modern Data Management
Security, Privacy and Trust in Modern Data Management, 383-397
STARTPAGE=383;ENDPAGE=397;TITLE=Security, Privacy and Trust in Modern Data Management
Security, Privacy, and Trust in Modern Data Management ISBN: 9783540698609
STARTPAGE=383;ENDPAGE=397;TITLE=Security, Privacy, and Trust in Modern Data Management
Security, Privacy and Trust in Modern Data Management, 383-397
STARTPAGE=383;ENDPAGE=397;TITLE=Security, Privacy and Trust in Modern Data Management
Security, Privacy, and Trust in Modern Data Management ISBN: 9783540698609
Privacy is a prime concern in today’s information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f3a9409893082f4577b2511f2d0d48f8
https://research.tue.nl/nl/publications/c8c06aa9-d97b-498d-b033-7670eb49092b
https://research.tue.nl/nl/publications/c8c06aa9-d97b-498d-b033-7670eb49092b
Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterpr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::48689e1eecc273f1d0a8da1785e2b1c7
https://research.tue.nl/nl/publications/8b748750-5089-4963-8291-e03cccc9027f
https://research.tue.nl/nl/publications/8b748750-5089-4963-8291-e03cccc9027f
Autor:
Cederquist, J.G., Corin, R.J., Dekker, M.A.C., Etalle, Sandro, den Hartog, Jeremy, Lenzini, Gabriele
We present a distributed framework where agents can share data along with usage policies. We use an expressive policy language including conditions, obligations and delegation. Our framework also supports the possibility to refine policies. Policies
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::579b5b7e76b22ebb1c7bc2717f4d53d0
https://research.tue.nl/nl/publications/f2f59c27-8137-4759-a60a-73d8a1aac83c
https://research.tue.nl/nl/publications/f2f59c27-8137-4759-a60a-73d8a1aac83c
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management languages such as the family of Role Based Trust Management languages (RT). T
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::a7693069f3b4a7d906c729341e85da7d
https://research.utwente.nl/en/publications/38da3097-4efb-4dc6-a55e-2ff5e89eec04
https://research.utwente.nl/en/publications/38da3097-4efb-4dc6-a55e-2ff5e89eec04