Sciweavers

227 search results - page 26 / 46
» A Spatial-Epistemic Logic for Reasoning about Security Proto...
Sort
View
JCP
2008
104views more  JCP 2008»
14 years 9 months ago
Trusted Decision Mechanism Based on Fuzzy Logic for Open Network
Trust mechanism will be an important trend in the field of security for open network. But, as an important factor risk is little considered in trust model. In this paper, Further w...
Lin Zhang, Ruchuan Wang, Haiyan Wang
POPL
2007
ACM
15 years 10 months ago
Types, bytes, and separation logic
We present a formal model of memory that both captures the lowlevel features of C's pointers and memory, and that forms the basis for an expressive implementation of separati...
Harvey Tuch, Gerwin Klein, Michael Norrish
ESORICS
2005
Springer
15 years 3 months ago
Quantifying Probabilistic Information Flow in Computational Reactive Systems
Information flow and non-interference are well-established techniques for expressing both integrity and privacy properties. Because of the enormous potential to transmit informati...
Michael Backes
ESORICS
2005
Springer
15 years 3 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
AINA
2003
IEEE
15 years 1 months ago
Formal Verification of Condition Data Flow Diagrams for Assurance of Correct Network Protocols
Condition Data Flow Diagrams (CDFDs) are a formalized notation resulting from the integration of Yourdon Data Flow Diagrams, Petri Nets, and pre-post notation. They are used in th...
Shaoying Liu