162
click to vote
CSFW
15 years 6 months ago
2010 IEEE
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
92
Voted
CSFW
15 years 6 months ago
2010 IEEE
—This paper seeks to answer fundamental questions about trade-offs between static and dynamic security analysis. It has been previously shown that flow-sensitive static informat...
133
Voted
CSFW
15 years 5 months ago
2010 IEEE
We embed an operational semantics for security protocols in the interactive theorem prover Isabelle/HOL and derive two strong protocol-independent invariants. These invariants allo...
128
click to vote
CSFW
15 years 5 months ago
2010 IEEE
We consider the problem of automating open bisimulation checking for the spi-calculus, an extension of the pi-calculus with cryptographic primitives. The notion of open bisimulatio...
104
click to vote
CSFW
15 years 6 months ago
2010 IEEE
—We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding, the state-of-the art...
|