100
click to vote
CSFW
15 years 18 days ago
2004 IEEE
Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design ef...
CSFW
15 years 18 days ago
2004 IEEE
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive informat...
CSFW
15 years 18 days ago
2004 IEEE
We analyze the multi-party contract-signing protocols of Garay and MacKenzie (GM) and of Baum and Waidner (BW). We use a finite-state tool, MOCHA, which allows specification of pr...
CSFW
15 years 18 days ago
2004 IEEE
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
CSFW
15 years 18 days ago
2004 IEEE |