Sciweavers

2043 search results - page 263 / 409
» Reasoning About Security Models
Sort
View
103
Voted
HICSS
2000
IEEE
160views Biometrics» more  HICSS 2000»
15 years 5 months ago
Analysis of Coordinated Multilateral Trades
A new operating paradigm is still needed for the power industry in order to achieve a workable deregulated market. The two main proposals, namely the Bilateral and the Poolco mode...
Pierre-François D. Quet, Jose B. Cruz Jr., ...
ASIACRYPT
2008
Springer
15 years 2 months ago
Ambiguous Optimistic Fair Exchange
Optimistic fair exchange (OFE) is a protocol for solving the problem of exchanging items or services in a fair manner between two parties, a signer and a verifier, with the help o...
Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Su...
94
Voted
PLDI
2012
ACM
13 years 3 months ago
Language-based control and mitigation of timing channels
We propose a new language-based approach to mitigating timing channels. In this language, well-typed programs provably leak only a bounded amount of information over time through ...
Danfeng Zhang, Aslan Askarov, Andrew C. Myers
CSFW
2012
IEEE
13 years 3 months ago
Measuring Information Leakage Using Generalized Gain Functions
Abstract—This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative information flow. In g-leakage, the benefit that an adversary derives f...
Mário S. Alvim, Konstantinos Chatzikokolaki...
WWW
2004
ACM
16 years 1 months ago
CTR-S: a logic for specifying contracts in semantic web services
A requirements analysis in the emerging field of Semantic Web Services (SWS) (see http://daml.org/services/swsl/requirements/) has identified four major areas of research: intelli...
Hasan Davulcu, Michael Kifer, I. V. Ramakrishnan