Sciweavers

5255 search results - page 337 / 1051
» Formal Methods for Privacy
Sort
View
144
Voted
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
15 years 9 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
CSFW
1996
IEEE
15 years 9 months ago
An Immunological Approach to Change Detection: Theoretical Results
: This paper examines some of the theoretical foundations of the distributable change detection method introduced by Forrest et al. in [10], including fundamental bounds on some of...
Patrik D'haeseleer
CCS
1993
ACM
15 years 9 months ago
NetCash: A Design for Practical Electronic Currency on the Internet
NetCash is a framework that supports realtime electronic payments with provision of anonymity over an unsecure network. It is designed to enable new types of services on the Inter...
Gennady Medvinsky, B. Clifford Neuman
OOPSLA
1990
Springer
15 years 8 months ago
Exception Handling and Object-Oriented Programming: Towards a Synthesis
The paper presents a discussion and a specification of an exception handling system dedicated to object-oriented programming. We show how a full object-oriented representation of ...
Christophe Dony
CSFW
2009
IEEE
15 years 8 months ago
Specification and Analysis of Dynamic Authorisation Policies
This paper presents a language, based on transaction logic, for specifying dynamic authorisation policies, i.e., rules governing actions that may depend on and update the authoris...
Moritz Y. Becker