Sciweavers

5255 search results - page 197 / 1051
» Formal Methods for Privacy
Sort
View
108
Voted
CCS
1997
ACM
15 years 8 months ago
The Security of Static Typing with Dynamic Linking
Dynamic linking is a requirement for portable executable content. Executable content cannot know, ahead of time, where it is going to be executed, nor know the proper operating sy...
Drew Dean
CCS
2006
ACM
15 years 7 months ago
Ring signatures without random oracles
Since the formalization of ring signature by Rivest, Shamir and Tauman in 2001, there are lots of variations appeared in the literature. Almost all of the variations rely on the ra...
Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Li...
144
Voted
ESORICS
2008
Springer
15 years 5 months ago
Compositional Refinement of Policies in UML - Exemplified for Access Control
The UML is the de facto standard for system specification, but offers little specialized support for the specification and analysis of policies. This paper presents Deontic STAIRS,...
Bjørnar Solhaug, Ketil Stølen
125
Voted
CCS
2010
ACM
15 years 4 months ago
Computational indistinguishability logic
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational models. It captures reasoning patterns that are common in p...
Gilles Barthe, Marion Daubignard, Bruce M. Kapron,...
121
Voted
OOPSLA
2010
Springer
15 years 2 months ago
Modular logic metaprogramming
In logic metaprogramming, programs are not stored as plain textfiles but rather derived from a deductive database. While the benefits of this approach for metaprogramming are ob...
Karl Klose, Klaus Ostermann