Sciweavers

65 search results - page 3 / 13
» Modelling Security Properties in a Grid-based Operating Syst...
Sort
View
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 3 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
SACMAT
2009
ACM
14 years 8 days ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
ARCS
2004
Springer
13 years 11 months ago
Finite-State Modeling, Analysis and Testing of System Vulnerabilities
: Man-machine systems have several desirable properties, as to user friendliness, reliability, safety, security or other global system attributes. The potential for the lack, or br...
Fevzi Belli, Christof J. Budnik, Nimal Nissanke
CCS
2005
ACM
13 years 11 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
DANCE
2002
IEEE
13 years 10 months ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...