Sciweavers

2043 search results - page 158 / 409
» Reasoning About Security Models
Sort
View
98
Voted
ATAL
2009
Springer
15 years 7 months ago
Dialogues that account for different perspectives in collaborative argumentation
It is often the case that agents within a system have distinct types of knowledge. Furthermore, whilst common goals may be agreed upon, the particular representations of the indiv...
Elizabeth Black, Katie Atkinson
117
Voted
CCS
2007
ACM
15 years 7 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
114
Voted
ICS
2003
Tsinghua U.
15 years 6 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
ENTCS
2007
97views more  ENTCS 2007»
15 years 23 days ago
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions
In this paper we develop a framework, based on strand spaces, for reasoning about cryptographic protocols and characterizing their executions. We define skeletons, homomorphisms,...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
107
Voted
IEEEARES
2007
IEEE
15 years 7 months ago
Models for automatic generation of safety-critical real-time systems
Model-based development has become state of the art in software engineering. A number of tools, like Matlab/Simulink or SCADE, are available for the automatic generation of applic...
Christian Buckl, Matthias Regensburger, Alois Knol...