Sciweavers

2432 search results - page 59 / 487
» Cryptographic logical relations
Sort
View
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 4 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
TACAS
2007
Springer
105views Algorithms» more  TACAS 2007»
15 years 4 months ago
Hoare Logic for Realistically Modelled Machine Code
This paper presents a mechanised Hoare-style programming logic framework for assembly level programs. The framework has been designed to fit on top of operational semantics of rea...
Magnus O. Myreen, Michael J. C. Gordon
IFIP
2005
Springer
15 years 3 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
MFCS
1993
Springer
15 years 2 months ago
The Second Calculus of Binary Relations
We view the Chu space interpretation of linear logic as an alternative interpretation of the language of the Peirce calculus of binary relations. Chu spaces amount to K-valued bin...
Vaughan R. Pratt
ICDE
2002
IEEE
103views Database» more  ICDE 2002»
15 years 3 months ago
Using Unity to Semi-Automatically Integrate Relational Schema
Unity is an architecture for integrating relational databases that performs three processes: metadata capture, semantic integration, and query formulation and execution. The found...
Ramon Lawrence, Ken Barker