Keyword : computer security


An Access Control Model for the Adhocracy Organization Using RBAC
Won Bo SHIM Seog PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 165-175
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols etc.
Keyword: 
Role Based Access ControlAccess Control Modeladhocracycomputer security
 Summary | Full Text:PDF(1.3MB)

An lmproved Method for Formal Security Verification of Cryptographic Protocols
Hajime WATANABE Toru FUJIWARA Tadao KASAMI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/07/25
Vol. E79-A  No. 7 ; pp. 1089-1096
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
authenticationcomputer securitycryptographic protocolprotocol verification
 Summary | Full Text:PDF(689.3KB)

A System for Deciding the Security of Cryptographic Protocols
Hajime WATANABE Toru FUJIWARA Tadao KASAMI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 96-103
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
computer securitycryptographic protocolprotocol verification
 Summary | Full Text:PDF(630.8KB)