Sciweavers

1757 search results - page 38 / 352
» Secure Content Validation
Sort
View
GCC
2003
Springer
15 years 4 months ago
Secure Grid-Based Mobile Agent Platform by Instance-Oriented Delegation
An instance-oriented security mechanism is proposed to deal with security threats in building a general-purpose mobile agent middleware in Grid environment. The proposed solution i...
Tianchi Ma, Shanping Li
SP
2006
IEEE
104views Security Privacy» more  SP 2006»
15 years 5 months ago
A Logic for Constraint-based Security Protocol Analysis
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we...
Ricardo Corin, Sandro Etalle, Ari Saptawijaya
CSFW
2008
IEEE
15 years 5 months ago
Hyperproperties
Properties, which have long been used for reasoning about systems, are sets of traces. Hyperproperties, introduced here, are sets of properties. Hyperproperties can express securi...
Michael R. Clarkson, Fred B. Schneider
CCR
2006
110views more  CCR 2006»
14 years 11 months ago
On the feasibility of commercial, legal P2P content distribution
A spirited panel was recently held at the 10th International Web Caching and Content Distribution workshop on the future of P2P in content distribution [1]. After more than ten ye...
Pablo Rodriguez, See-Mong Tan, Christos Gkantsidis
CARDIS
2004
Springer
150views Hardware» more  CARDIS 2004»
15 years 4 months ago
Enforcing High-Level Security Properties for Applets
Smart card applications often handle privacy-sensitive information, and therefore must obey certain security policies. Typically, such policies are described as high-level security...
Mariela Pavlova, Gilles Barthe, Lilian Burdy, Mari...