搜索结果: 1-4 共查到“Authorization”相关记录4条 . 查询时间(0.052 秒)
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings
PKEET public-key cryptography
2016/3/14
In recent years, public key encryption with equality test (PKEET) has become
a hot research topic in the cryptography community due to the advancement of cloud
computing. Recently, Ma et al. propose...
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version)
TPM Trusted Computing formal methods
2016/1/25
We present the first automated proof of the authorization
protocols in TPM 2.0 in the computational model. The Trusted Platform
Module(TPM) is a chip that enables trust in computing platforms
and a...
Behavior-based Authorization Policy for Multi-domain PCE-based MPLS and WSON
MPLS WSON Authorization Behavior-based
2015/5/18
A novel path computation authorization policy based on PCEP peer behavior analysis and attack pattern detection is presented. Applicability is demonstrated in multi-domain PCE-based WSON. Experimental...
DNA databanks and consent: A suggested policy option involving an authorization model
DNA databanks consent
2008/11/7
Background
Genetic databases are becoming increasingly common as a means of determining the relationship between lifestyle, environmental exposures and genetic diseases. These databases rely on large...