Sciweavers

2137 search results - page 224 / 428
» Proving Abstract Non-interference
Sort
View
120
Voted
ESORICS
2006
Springer
15 years 7 months ago
A Formal Model of Access Control for Mobile Interactive Devices
Abstract. This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary perm...
Frédéric Besson, Guillaume Dufay, Th...
131
Voted
FC
2006
Springer
97views Cryptology» more  FC 2006»
15 years 7 months ago
Privacy-Protecting Coupon System Revisited
Abstract. At FC'05, Chen et al. introduced an elegant privacy protecting coupon (PPC) system, CESSS05 [13], in which users can purchase multi-coupons and redeem them unlinkabl...
Lan Nguyen
120
Voted
FC
2006
Springer
119views Cryptology» more  FC 2006»
15 years 7 months ago
Auditable Privacy: On Tamper-Evident Mix Networks
Abstract. We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers....
Jong Youl Choi, Philippe Golle, Markus Jakobsson
FM
2006
Springer
148views Formal Methods» more  FM 2006»
15 years 7 months ago
Automatic Translation from Circus to Java
Abstract. Circus is a combination of Z and CSP that supports the development of state-rich reactive systems based on refinement. In this paper we present JCircus, a tool that autom...
Angela Freitas, Ana Cavalcanti
142
Voted
FORMATS
2006
Springer
15 years 7 months ago
A Characterization of Meaningful Schedulers for Continuous-Time Markov Decision Processes
Abstract. Continuous-time Markov decision process are an important variant of labelled transition systems having nondeterminism through labels and stochasticity through exponential...
Nicolás Wolovick, Sven Johr