Sciweavers

2043 search results - page 159 / 409
» Reasoning About Security Models
Sort
View
99
Voted
KBSE
2008
IEEE
15 years 7 months ago
MTSA: The Modal Transition System Analyser
Modal Transition Systems (MTS) are operational models that distinguish between required and proscribed behaviour of the system to be and behaviour which it is not yet known whethe...
Nicolás D'Ippolito, Dario Fischbein, Marsha...
85
Voted
CCS
2007
ACM
15 years 7 months ago
A calculus of challenges and responses
er presents a novel approach for concisely abstracting authentication s and for subsequently analyzing those abstractions in a sound manner, i.e., deriving authentication guarante...
Michael Backes, Agostino Cortesi, Riccardo Focardi...
84
Voted
CCS
2005
ACM
15 years 6 months ago
On fairness in simulatability-based cryptographic systems
Simulatability constitutes the cryptographic notion of a secure refinement and has asserted its position as one of the fundamental concepts of modern cryptography. Although simula...
Michael Backes, Dennis Hofheinz, Jörn Mü...
CSFW
2010
IEEE
15 years 4 months ago
Approximation and Randomization for Quantitative Information-Flow Analysis
—Quantitative information-flow analysis (QIF) is an emerging technique for establishing information-theoretic confidentiality properties. Automation of QIF is an important step...
Boris Köpf, Andrey Rybalchenko
105
Voted
ISI
2008
Springer
15 years 25 days ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi