Sciweavers

5475 search results - page 45 / 1095
» Model Driven Security
Sort
View
AINA
2004
IEEE
15 years 4 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
89
Voted
ETRICS
2006
15 years 4 months ago
Controlling Access to Documents: A Formal Access Control Model
Paul E. Sevinç, David A. Basin, Ernst-R&uum...
81
Voted
OOPSLA
2000
Springer
15 years 4 months ago
Improving the Java memory model using CRF
Jan-Willem Maessen, Arvind, Xiaowei Shen
90
Voted
SP
1991
IEEE
15 years 4 months ago
A Pattern-Oriented Intrusion-Detection Model and Its Applications
Shiuh-Pyng Shieh, Virgil D. Gligor
73
Voted
CCS
2008
ACM
15 years 2 months ago
Towards automated proofs for asymmetric encryption schemes in the random oracle model
Judicaël Courant, Marion Daubignard, Cristian...