Sciweavers

718 search results - page 11 / 144
» Security protocols, properties, and their monitoring
Sort
View
SIGOPSE
2004
ACM
15 years 5 months ago
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
Michael Hohmuth, Michael Peter, Hermann Härti...
RV
2009
Springer
101views Hardware» more  RV 2009»
15 years 6 months ago
DMaC: Distributed Monitoring and Checking
Abstract. We consider monitoring and checking formally specified properties in a network. We are addressing the problem of deploying the checkers on different network nodes that ...
Wenchao Zhou, Oleg Sokolsky, Boon Thau Loo, Insup ...
IASTEDSEA
2004
15 years 1 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
15 years 6 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
LPAR
2005
Springer
15 years 5 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...