Sciweavers

213 search results - page 1 / 43
» A formal security policy for xenon
Sort
View
CCS
2008
ACM
13 years 6 months ago
A formal security policy for xenon
John McDermott, Leo Freitas
JCS
2002
118views more  JCS 2002»
13 years 4 months ago
Verified Formal Security Models for Multiapplicative Smart Cards
We present two generic formal security models for operating systems of multiapplicative smart cards. The models formalize the main security aspects of secrecy, integrity, secure co...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...
IJNSEC
2010
145views more  IJNSEC 2010»
12 years 11 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
ACSAC
1996
IEEE
13 years 9 months ago
Formal Techniques for an ITSEC-E4 Secure Gateway
In this paper we describe the method used to develop a gateway capable of meeting the ITSEC E4 requirements. The security policy was formally modelled and proven consistent with t...
Pierre Bieber
ESORICS
2000
Springer
13 years 8 months ago
Verification of a Formal Security Model for Multiapplicative Smart Cards
Abstract. We present a generic formal security model for operating systems of multiapplicative smart cards. The model formalizes the main security aspects of secrecy, integrity, se...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...