We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
We present a general unwinding framework for the definition of information flow security properties of concurrent programs, described in a simple imperative language enriched wi...