CS Store Search
Displaying 1-6 out of 6 total
A Correctness Proof of a Mesh Security Architecture
Computer Security Foundations Symposium, IEEE
By Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh Tripunitara
Issue Date:June 2008
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a developed key hierarchy and full protocol definitions. This paper examines th...
Towards Formal Verification of Role-Based Access Control Policies
IEEE Transactions on Dependable and Secure Computing
By Somesh Jha, Ninghui Li, Mahesh Tripunitara, Qihua Wang, William Winsborough
Issue Date:October 2008
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current state of the art of policy specification and management. In this paper, we for...
Resolving the Micropayment Problem
By Mahesh Tripunitara, Tom Messerges
Issue Date:February 2007
Cryptography-based approaches present a better long-term solution to the micropayment problem than the alternative of restructuring transaction fees.
Reliable Computing with Ultra-Reduced Instruction Set Co-processors
By Dan Wang,Aravindkumar Rajendiran,Hiren Patel,Sundaram Ananthanarayanan,Mahesh Tripunitara,Siddharth Garg
Issue Date:December 2013
This work presents a method to reliably perform computations in the presence of hard faults arising from aggressive technology scaling, and design defects from human error. Our method is based on the observation that a single Turing-complete instruction ca...
Panel on granularity in access control
Found in: Proceedings of the 18th ACM symposium on Access control models and technologies (SACMAT '13)
By Mahesh Tripunitara, Martin Kuhlmann, Vijay Atluri
Issue Date:June 2013
This panel will address the following question. Does an increase in the granularity of access control systems produce a measurable reduction in risk and help meet the goals of the organization, or is the cost prohibitively high? After decades of access con...
Resiliency Policies in Access Control
Found in: ACM Transactions on Information and System Security (TISSEC)
By Mahesh Tripunitara, Ninghui Li, Qihua Wang
Issue Date:April 2009
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An example resiliency policy requires that upon removal of any s users, there s...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.