Sciweavers

13 search results - page 1 / 3
» csfw 2002
Sort
View
92
Voted
CSFW
2002
IEEE
15 years 6 months ago
A Logic for Reasoning about Digital Rights
Riccardo Pucella, Vicky Weissman
91
Voted
CSFW
2002
IEEE
15 years 6 months ago
Formal Specification of Intrusion Signatures and Detection Rules
Jean-Philippe Pouzol, Mireille Ducassé
100
Voted
CSFW
2002
IEEE
15 years 6 months ago
Strand Spaces and Rank Functions: More than Distant Cousins
The strand spaces model and the rank functions model have both been used successfully to analyse and verify security protocols running on unbounded networks. At first sight, thes...
James Heather
119
Voted
CSFW
2002
IEEE
15 years 6 months ago
Quantifying Information Flow
We extend definitions of information flow so as to quantify the amount of information passed; in other words, we give a formal definition of the capacity of covert channels. Ou...
Gavin Lowe
116
Voted
CSFW
2002
IEEE
15 years 6 months ago
Probabilistic Analysis of Anonymity
We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of g...
Vitaly Shmatikov