Search For:

Displaying 1-6 out of 6 total
A Correctness Proof of a Mesh Security Architecture
Found in: Computer Security Foundations Symposium, IEEE
By Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh Tripunitara
Issue Date:June 2008
pp. 315-330
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a developed key hierarchy and full protocol definitions. This paper examines th...
Towards Formal Verification of Role-Based Access Control Policies
Found in: IEEE Transactions on Dependable and Secure Computing
By Somesh Jha, Ninghui Li, Mahesh Tripunitara, Qihua Wang, William Winsborough
Issue Date:October 2008
pp. 242-255
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current state of the art of policy specification and management. In this paper, we for...
Resolving the Micropayment Problem
Found in: Computer
By Mahesh Tripunitara, Tom Messerges
Issue Date:February 2007
pp. 104-106
Cryptography-based approaches present a better long-term solution to the micropayment problem than the alternative of restructuring transaction fees.
Reliable Computing with Ultra-Reduced Instruction Set Co-processors
Found in: IEEE Micro
By Dan Wang,Aravindkumar Rajendiran,Hiren Patel,Sundaram Ananthanarayanan,Mahesh Tripunitara,Siddharth Garg
Issue Date:December 2013
pp. 1
This work presents a method to reliably perform computations in the presence of hard faults arising from aggressive technology scaling, and design defects from human error. Our method is based on the observation that a single Turing-complete instruction ca...
Panel on granularity in access control
Found in: Proceedings of the 18th ACM symposium on Access control models and technologies (SACMAT '13)
By Mahesh Tripunitara, Martin Kuhlmann, Vijay Atluri
Issue Date:June 2013
pp. 85-86
This panel will address the following question. Does an increase in the granularity of access control systems produce a measurable reduction in risk and help meet the goals of the organization, or is the cost prohibitively high? After decades of access con...
Resiliency Policies in Access Control
Found in: ACM Transactions on Information and System Security (TISSEC)
By Mahesh Tripunitara, Ninghui Li, Qihua Wang
Issue Date:April 2009
pp. 1-34
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An example resiliency policy requires that upon removal of any s users, there s...