139
click to vote
CSFW
15 years 8 months ago
2006 IEEE
We argue that games are expressive enough to encompass (history-based) access control, (resource) usage control (e.g., dynamic adaptive access control of reputation systems), acco...
158
click to vote
CSFW
15 years 8 months ago
2006 IEEE
Abstract. Interactive programs allow users to engage in input and output throughout execution. The ubiquity of such programs motivates the development of models for reasoning about...
108
click to vote
CSFW
15 years 6 months ago
2006 IEEE
A distributed calculus is proposed for describing networks of services. We model service interaction through a call-by-property invocation mechanism, by specifying the security co...
123
click to vote
CSFW
15 years 8 months ago
2006 IEEE
We develop a compositional method for proving cryptographically sound security properties of key exchange protocols, based on a symbolic logic that is interpreted over conventiona...
102
click to vote
CSFW
15 years 8 months ago
2006 IEEE
Robustness links confidentiality and integrity properties of a computing system and has been identified as a useful property for characterizing and enforcing security. Previous ...
|