ā Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speciļ¬...
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
We introduce a language and system that supports deļ¬nition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Abstract. We describe how CSP-OZ, an integrated formal method combining the process algebra CSP with the speciļ¬cation language Object-Z, can be linked to standard software engine...