Sciweavers

5475 search results - page 219 / 1095
» Model Driven Security
Sort
View
117
Voted
IFIP
2009
Springer
15 years 10 months ago
Specifying and Modelling Secure Channels in Strand Spaces
We adapt the Strand Spaces model to reason abstractly about layered security protocols, where an Application Layer protocol ed on top of a secure transport protocol. The model abst...
Allaa Kamil, Gavin Lowe
ESORICS
2003
Springer
15 years 9 months ago
An On-the-Fly Model-Checker for Security Protocol Analysis
We introduce the on-the-fly model-checker OFMC, a tool that combines two methods for analyzing security protocols. The first is the use of lazy data-types as a simple way of buil...
David A. Basin, Sebastian Mödersheim, Luca Vi...
127
Voted
IJNSEC
2010
127views more  IJNSEC 2010»
14 years 10 months ago
Identity-based Threshold Signature Secure in the Standard Model
Recently, design of Identity-based (ID-based) threshold signature schemes which are efficient and provably secure in the standard model has drawn great concerns. In this paper, an...
Hu Xiong, Zhiguang Qin, Fagen Li
121
Voted
NSDI
2008
15 years 6 months ago
Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model
In this paper, we discuss Bitfrost, the security model developed by the One Laptop Per Child project for its XO laptop computers. Bitfrost implements a number of security measures...
Meredith L. Patterson, Len Sassaman, David Chaum
126
Voted
ECBS
2008
IEEE
106views Hardware» more  ECBS 2008»
15 years 10 months ago
AMABULO - A Model Architecture for Business Logic
Models are widely used for communication and documentation purposes. They also tend to be used as parameters for code generation. Because these models have to be complete, consist...
Tobias Brückmann, Volker Gruhn