Sciweavers

53 search results - page 1 / 11
» Formal Analysis of Privacy in an eHealth Protocol
Sort
View
ESORICS
2012
Springer
11 years 7 months ago
Formal Analysis of Privacy in an eHealth Protocol
Given the sensitive nature of health data, privacy of eHealth systems is of prime importance. An eHealth system must enforce that users remain private, even if they are bribed or c...
Naipeng Dong, Hugo Jonker, Jun Pang
CCS
2010
ACM
13 years 5 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...
CSFW
2011
IEEE
12 years 4 months ago
Formal Analysis of Protocols Based on TPM State Registers
—We present a Horn-clause-based framework for analysing security protocols that use platform configuration registers (PCRs), which are registers for maintaining state inside the...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
13 years 11 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
CSFW
1998
IEEE
13 years 9 months ago
Formal Analysis of a Non-Repudiation Protocol
This paper applies the theory of Communicating Sequential Processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols di er from authent...
Steve Schneider