Sciweavers

2043 search results - page 136 / 409
» Reasoning About Security Models
Sort
View
FM
2005
Springer
98views Formal Methods» more  FM 2005»
15 years 6 months ago
Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern
The Mondex Electronic Purse system [18] is an outstanding example of formal refinement techniques applied to a genuine industrial scale application, and notably, was the first ve...
Richard Banach, Michael Poppleton, Czeslaw Jeske, ...
COMPSEC
2004
115views more  COMPSEC 2004»
15 years 18 days ago
On risk: perception and direction
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Andrew Stewart
95
Voted
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
15 years 7 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
WETICE
2005
IEEE
15 years 6 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick
94
Voted
ESORICS
2005
Springer
15 years 6 months ago
Enforcing Non-safety Security Policies with Program Monitors
We consider the enforcement powers of program monitors, which intercept security-sensitive actions of a target application at run time and take remedial steps whenever the target a...
Jay Ligatti, Lujo Bauer, David Walker