Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CSFW
2004
IEEE
12 years 1 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
CSFW
2004
IEEE
12 years 1 months ago
Lenient Array Operations for Practical Secure Information Flow
Our goal in this paper is to make secure information flow typing more practical. We propose simple and permissive typing rules for array operations in a simple sequential imperati...
Zhenyue Deng, Geoffrey Smith
CSFW
2004
IEEE
12 years 1 months ago
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protocol environ...
Michael Backes, Birgit Pfitzmann
CSFW
2004
IEEE
12 years 1 months ago
Abstraction and Refinement in Protocol Derivation
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
CSFW
2004
IEEE
12 years 1 months ago
Using Active Learning in Intrusion Detection
Intrusion Detection Systems (IDSs) have become an important part of operational computer security. They are the last line of defense against malicious hackers and help detect ongo...
Magnus Almgren, Erland Jonsson
CSFW
2004
IEEE
12 years 1 months ago
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework
Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design ef...
Frédéric Cuppens, Sylvain Gombault, ...
CSFW
2004
IEEE
12 years 1 months ago
Formal Analysis of Multi-Party Contract Signing
We analyze the multi-party contract-signing protocols of Garay and MacKenzie (GM) and of Baum and Waidner (BW). We use a finite-state tool, MOCHA, which allows specification of pr...
Rohit Chadha, Steve Kremer, Andre Scedrov
CSFW
2004
IEEE
12 years 1 months ago
A Formal Foundation for XrML
Joseph Y. Halpern, Vicky Weissman
books