Conceptual model and architecture of MAFTIA

A Adelsbach, C Cachin, S Creese, Y Deswarte… - 2003 - repositorio.ul.pt
This deliverable builds on the work reported in [MAFTIA 2000] and [Powell and Stroud
2001]. It contains a further refinement of the MAFTIA conceptual model and a revised …

[PDF][PDF] Conceptual model and architecture

D Powell, RJ Stroud, A Adelsbach… - Department of …, 2001 - maftia.cs.ncl.ac.uk
This deliverable builds on the work reported in MAFTIA deliverable D1 [Cachin et al. 2000a].
It contains a refinement of the MAFTIA conceptual model and a discussion of the MAFTIA …

Levels of authentication assurance: An investigation

A Nenadic, N Zhang, L Yao… - … Symposium on Information …, 2007 - ieeexplore.ieee.org
The ES-LoA project, funded by the UK Joint Information Systems Committee (JISC) under its
e-Infrastructure Security Programme, investigates current and future needs among UK …

[PDF][PDF] Complete Specification of APIs and Protocols for the MAFTIA Middleware

NF Neves, P Verissimo - TECHNICAL REPORT SERIES …, 2003 - maftia.cs.ncl.ac.uk
This document describes the complete specification of the APIs and Protocols for the
MAFTIA Middleware. The architecture of the middleware subsystem has been described in a …

[HTML][HTML] Faith-based security

H Berghel - Communications of the ACM, 2008 - dl.acm.org
Faith-based security Page 1 COMMUNICATIONS OF THE ACM April 2008/Vol. 51, No. 4 13 IT
security has received increased attention primarily, but not exclusively, due to the increased …

Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process

P Hosseyni, R Küsters, T Würtele - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In recent years, the number of third-party services that can access highly-sensitive data has
increased steadily, eg, in the financial sector, in eGovernment applications, or in high …

[PDF][PDF] TOGAF™ and ArchiMate®: A future together

H Jonkers, E Proper, M Turner - White Paper W, 2009 - researchgate.net
Executive Summary This White Paper discusses the TOGAF and ArchiMate specifications,
providing a model of integration that would support long-term convergence and …

[PDF][PDF] How certification systems fail: Lessons from the Ware report

SJ Murdoch, M Bond, R Anderson - IEEE Security and Privacy, 2012 - sid.ethz.ch
The heritage of most security certification standards in the banking industry can be traced
back to a 1970 report by a task force operating under the auspices of the US Department of …

[PDF][PDF] A new mandatory security policy combining secrecy and integrity

PA Karger, V Austel, D Toll - RC, 2000 - dominoweb.draco.res.ibm.com
This paper describes a new mandatory security model that better combines secrecy and
commercial data integrity requirements than previous models based on Bell and LaPadula …

The design and verification of a cryptographic security architecture

P Gutmann - 2000 - researchspace.auckland.ac.nz
A cryptographic security architecture constitutes the collection of hardware and software
which protects and controls the use of encryption keys and similar cryptovariables. This …