Sciweavers

1183 search results - page 133 / 237
» On flow-sensitive security types
Sort
View
TYPES
2004
Springer
15 years 9 months ago
A Machine-Checked Formalization of the Random Oracle Model
Abstract. Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowl...
Gilles Barthe, Sabrina Tarento
ICALP
2003
Springer
15 years 9 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
ITP
2010
164views Mathematics» more  ITP 2010»
15 years 8 months ago
Nitpick: A Counterexample Generator for Higher-Order Logic Based on a Relational Model Finder
Nitpick is a counterexample generator for Isabelle/HOL that builds on Kodkod, a SAT-based first-order relational model finder. Nitpick supports unbounded quantification, (co)ind...
Jasmin Christian Blanchette, Tobias Nipkow
ACSW
2003
15 years 5 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton
JLP
2007
74views more  JLP 2007»
15 years 4 months ago
Linearity and bisimulation
Exploiting linear type structure, we introduce a new theory bisimilarity for the π-calculus in which we abstract away not only τ-actions but also non-τ actions which do not aff...
Nobuko Yoshida, Kohei Honda, Martin Berger