161
Voted
CSFW
15 years 5 months ago
2008 IEEE
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
144
Voted
CSFW
15 years 10 months ago
2008 IEEE
Properties, which have long been used for reasoning about systems, are sets of traces. Hyperproperties, introduced here, are sets of properties. Hyperproperties can express securi...
126
Voted
CSFW
15 years 5 months ago
2008 IEEE
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a ...
124
Voted
CSFW
15 years 10 months ago
2008 IEEE
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
132
Voted
CSFW
15 years 10 months ago
2008 IEEE
DKAL is a new declarative authorization language for distributed systems. It is based on existential fixed-point logic and is considerably more expressive than existing authoriza...
|