Sciweavers

5255 search results - page 278 / 1051
» Formal Methods for Privacy
Sort
View
CSFW
2008
IEEE
15 years 6 months ago
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
Michael Backes, Catalin Hritcu, Matteo Maffei
ESORICS
2010
Springer
15 years 5 months ago
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the...
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven...
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
15 years 4 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
OOPSLA
2010
Springer
15 years 2 months ago
Mostly modular compilation of crosscutting concerns by contextual predicate dispatch
The modularity of aspect-oriented programming (AOP) has been a controversial issue. To investigate this issue compared with object-oriented programming (OOP), we propose a simple ...
Shigeru Chiba, Atsushi Igarashi, Salikh Zakirov
ICWS
2009
IEEE
15 years 2 months ago
DIALOG: Distributed Auditing Logs
Service-oriented systems facilitate business workflows to span multiple organizations (e.g. by means of Web services). As a side effect, data may be more easily transferred over o...
Christoph Ringelstein, Steffen Staab