Sciweavers

28 search results - page 4 / 6
» Specifying and Modelling Secure Channels in Strand Spaces
Sort
View
ICC
2008
IEEE
142views Communications» more  ICC 2008»
15 years 3 months ago
A Comprehensive Analytical Model for IEEE 802.11e QoS Differentiation Schemes under Unsaturated Traffic Loads
Arbitrary Inter-frame Space (AIFS), Contention Window (CW) and Transmission Opportunity (TXOP) are three important Quality-of-Service (QoS) differentiation schemes specified in the...
Jia Hu, Geyong Min, Michael E. Woodward, Weijia Ji...
SIGADA
2004
Springer
15 years 2 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
WETICE
2005
IEEE
15 years 3 months ago
Application of Lightweight Formal Methods to Software Security
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...
David P. Gilliam, John D. Powell, Matt Bishop
HPDC
1996
IEEE
15 years 1 months ago
The Core Legion Object Model
This document describes the core Legion object model. The model specifies the composition and functionality of Legion's core objects--those objects that cooperate to create, ...
Michael J. Lewis, Andrew S. Grimshaw
CCS
2011
ACM
13 years 9 months ago
Trace equivalence decision: negative tests and non-determinism
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...