Sciweavers

23 search results - page 5 / 5
» Characterization of Security Notions for Probabilistic Priva...
Sort
View
TGC
2007
Springer
14 years 11 days ago
Adversaries and Information Leaks (Tutorial)
Secure information flow analysis aims to prevent programs from leaking their H (high) inputs to their L (low) outputs. A major challenge in this area is to relax the standard noni...
Geoffrey Smith
FOSSACS
2009
Springer
14 years 1 months ago
Bisimulation for Demonic Schedulers
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...
Konstantinos Chatzikokolakis, Gethin Norman, David...
CSFW
2002
IEEE
13 years 11 months ago
Secrecy in Multiagent Systems
We introduce a general framework for reasoning about secrecy requirements in multiagent systems. Because secrecy requirements are closely connected with the knowledge of individua...
Joseph Y. Halpern, Kevin R. O'Neill