121
click to vote
CSFW
15 years 4 months ago
2007 IEEE
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
CSFW
15 years 6 months ago
2007 IEEE
Task-PIOA is a modeling framework for distributed systems with both probabilistic and nondeterministic behaviors. It is suitable for cryptographic applications because its task-bas...
102
Voted
CSFW
15 years 6 months ago
2007 IEEE
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
94
Voted
CSFW
15 years 6 months ago
2007 IEEE
Interrupt-driven communication with hardware devices can be exploited for establishing covert channels. In this article, we propose an information-theoretic framework for analyzin...
100
click to vote
CSFW
15 years 6 months ago
2007 IEEE
se an abstract model of business processes for the purpose of (i) evaluating privacy policy in light of the goals of the process and (ii) developing automated support for privacy ...
|