133
click to vote
CSFW
15 years 2 months ago
2008 IEEE
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
116
click to vote
CSFW
15 years 7 months ago
2008 IEEE
Properties, which have long been used for reasoning about systems, are sets of traces. Hyperproperties, introduced here, are sets of properties. Hyperproperties can express securi...
100
click to vote
CSFW
15 years 2 months ago
2008 IEEE
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a ...
98
Voted
CSFW
15 years 7 months ago
2008 IEEE
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
CSFW
15 years 7 months ago
2008 IEEE
DKAL is a new declarative authorization language for distributed systems. It is based on existential fixed-point logic and is considerably more expressive than existing authoriza...
|