Sciweavers

JCS
2007
103views more  JCS 2007»
13 years 4 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
JCS
2007
80views more  JCS 2007»
13 years 4 months ago
Secure information flow for a concurrent language with scheduling
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using the proof assistant Isabelle/HOL, we have specified an information flow ty...
Gilles Barthe, Leonor Prensa Nieto
JCS
2007
56views more  JCS 2007»
13 years 4 months ago
Parity-based inference control for multi-dimensional range sum queries
Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda W...
JCS
2007
120views more  JCS 2007»
13 years 4 months ago
Dynamic types for authentication
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
JCS
2007
69views more  JCS 2007»
13 years 4 months ago
Timed analysis of security protocols
Ricardo Corin, Sandro Etalle, Pieter H. Hartel, An...
JCS
2007
141views more  JCS 2007»
13 years 4 months ago
Compositional information flow security for concurrent programs
We present a general unwinding framework for the definition of information flow security properties of concurrent programs, described in a simple imperative language enriched wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
JCS
2007
84views more  JCS 2007»
13 years 4 months ago
On the security of group communication schemes
Many emerging applications in both wired and wireless networks need support of secure group communications. There have been many secure group communication schemes in the setting ...
Shouhuai Xu