Sciweavers

3420 search results - page 104 / 684
» A Language-Based Approach to Security
Sort
View
ACOM
2006
Springer
15 years 5 months ago
ACL Semantics Between Social Commitments and Mental Attitudes
Abstract. There are two main traditions in defining a semantics for agent communication languages, based either on mental attitudes or on social commitments. In this paper, we tran...
Guido Boella, Rossana Damiano, Joris Hulstijn, Lee...
150
Voted
FAC
2010
106views more  FAC 2010»
15 years 1 months ago
Automatic verification of Java programs with dynamic frames
Framing in the presence of data abstraction is a challenging and important problem in the verification of object-oriented programs [LLM07]. The dynamic frames approach is a promisi...
Jan Smans, Bart Jacobs, Frank Piessens, Wolfram Sc...
122
Voted
ESOP
2005
Springer
15 years 9 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
149
Voted
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
15 years 1 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
125
Voted
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 10 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...