Search
Search Results
-
GUCON: A Generic Graph Pattern Based Policy Framework for Usage Control Enforcement
Robust Usage Control (UC) mechanisms are necessary to protect sensitive data and resources, especially when these are distributed across multiple... -
The Tension between National and Local Concerns in Preparing for Large-Scale Generic Systems in Healthcare
Large-scale generic systems are typically adapted to local practice through configuration. This is especially important in healthcare, which involves...
-
Generic constructions of master-key KDM secure attribute-based encryption
Master-key key-dependent message (mKDM) security is a strong security notion for attribute-based encryption (ABE) schemes, which has been...
-
Updatable Policy-Compliant Signatures
Policy-compliant signatures (PCS) are a recently introduced primitive by Badertscher et al. [TCC 2021] in which a central authority distributes... -
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
With the rise of cloud computing, multi-user scenarios have become a common setting for data sharing nowadays. The conservative security notion might...
-
A comprehensive AI policy education framework for university teaching and learning
This study aims to develop an AI education policy for higher education by examining the perceptions and implications of text generative AI...
-
On the use of generic types for smart contracts
This paper shows that generic types ( generics ) are useful for writing more abstract and more general smart contracts, but this comes with some...
-
Traceable Policy-Based Signatures with Delegation
In PKC 2014, a policy-based signature (PBS) scheme was proposed by Bellare and Fuchsbauer in which a signer can only sign messages conforming to some... -
A certified access control policy language: TEpla
Access control is an information security process which guards protected resources against unauthorized access, as specified by restrictions in...
-
Unlinkable Policy-Based Sanitizable Signatures
In CT-RSA 2020, P3S was proposed as the first policy-based sanitizable signature scheme, allowing the signer to designate future message sanitizers... -
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case
Efficient implementations of software masked designs constitute both an important goal and a significant challenge to Side Channel Analysis attack...
-
Leading the Charge on Digital Regulation: The More, the Better, or Policy Bubble?
For about a decade, the concept of ‘digital sovereignty’ has been prominent in the European policy discourse. In the quest for digital sovereignty,...
-
Security Policy Learning
Security Policies define rules aiming to protect the infrastructure from insider and outsider threats. A key component to achieving this goal is... -
Difference rewards policy gradients
Policy gradient methods have become one of the most popular classes of algorithms for multi-agent reinforcement learning. A key challenge, however,...
-
Programmable access-controlled and generic erasable PUF design and its applications
Physical unclonable functions (PUFs) have not only been suggested as a new key storage mechanism, but—in the form of so-called strong PUFs —also as...
-
Generic Constructions of Server-Aided Revocable ABE with Verifiable Transformation
Attribute-based encryption (ABE) is a promising approach in cloud computing services to enable scalable access control on encrypted data.... -
How do academic public administration and public policy researchers affect policymaking? Functional grou**s from survey data
Using data from an original survey of 409 authors of recent articles in major public administration and policy journals, we investigate the...
-
Policy-Based Management
Policy-Based Management (PBM) is a system DBAs can use to report on or enforce standards across the enterprise, when used with a Central Management... -
-
Authorization and Policy Enforcement
The previous chapters covered the mechanics of authorizing an API call and authenticating a user. This chapter will discuss authorization vs. the...