Sciweavers

9 search results - page 1 / 2
» esorics 2000
Sort
View
107
Voted
ESORICS
2000
Springer
15 years 7 months ago
A Security Framework for a Mobile Agent System
Ciarán Bryce
108
Voted
ESORICS
2000
Springer
15 years 7 months ago
Analysing Time Dependent Security Properties in CSP Using PVS
Neil Evans, Steve Schneider
94
Voted
ESORICS
2000
Springer
15 years 7 months ago
Formal Verification of Cardholder Registration in SET
Giampaolo Bella, Fabio Massacci, Lawrence C. Pauls...
114
Voted
ESORICS
2000
Springer
15 years 7 months ago
A Formal Semantics for SPKI
We extend the logic and semantics of authorization due to Abadi, Lampson, et al. to support restricted delegation. Our formal model provides a simple interpretation for the variety...
Jon Howell, David Kotz
104
Voted
ESORICS
2000
Springer
15 years 7 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer