Sciweavers

5255 search results - page 45 / 1051
» Formal Methods for Privacy
Sort
View
ESORICS
2002
Springer
15 years 11 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
CCS
2005
ACM
15 years 5 months ago
Towards computationally sound symbolic analysis of key exchange protocols
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Prateek Gupta, Vitaly Shmatikov
SAFECOMP
1998
Springer
15 years 3 months ago
Safety Verification of Software Using Structured Petri Nets
A method is described for the analysis and the verification of safety in software systems. The method offers a formal notation for describing the software structure, the means for ...
Krzysztof Sacha
ICISS
2010
Springer
14 years 9 months ago
A Practical Generic Privacy Language
Abstract. We present a declarative language with a formal semantics for specifying both users' privacy preferences and services' privacy policies. Expressiveness and appl...
Moritz Y. Becker, Alexander Malkis, Laurent Bussar...
ZUM
1992
Springer
15 years 3 months ago
An International Survey of Industrial Applications of Formal Methods
Dan Craigen, Susan L. Gerhart, Ted Ralston