Sciweavers

ENTCS
2008
130views more  ENTCS 2008»
13 years 6 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
ENTCS
2008
150views more  ENTCS 2008»
13 years 6 months ago
Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures that are able to st...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...
ENTCS
2008
94views more  ENTCS 2008»
13 years 6 months ago
Monitoring External Resources in Java MIDP
We present a Java library for mobile phones which tracks and controls at runtime the use of potentially costly resources, such as premium rate text messages. This improves on the ...
David Aspinall, Patrick Maier, Ian Stark
ENTCS
2008
120views more  ENTCS 2008»
13 years 6 months ago
ConSpec - A Formal Language for Policy Specification
The paper presents ConSpec, an automata based policy specification language. The language trades off clean semantics to language expressiveness; a formal semantics for the languag...
Irem Aktug, Katsiaryna Naliuka
ENTCS
2008
64views more  ENTCS 2008»
13 years 6 months ago
Model-based Theory Combination
Traditional methods for combining theory solvers rely on capabilities of the solvers to produce all implied equalities or a pre-processing step that introduces additional literals...
Leonardo Mendonça de Moura, Nikolaj Bj&osla...
ENTCS
2008
132views more  ENTCS 2008»
13 years 6 months ago
Distributed Verification of Multi-threaded C++ Programs
Verification of multi-threaded C++ programs poses three major challenges: the large number of states, states with huge sizes, and time intensive expansions of states. This paper p...
Stefan Edelkamp, Shahid Jabbar, Damian Sulewski
ENTCS
2008
76views more  ENTCS 2008»
13 years 6 months ago
Computable Riesz Representation for Locally Compact Hausdorff Spaces
: By the Riesz Representation Theorem for locally compact Hausdorff spaces, for every positive linear functional I on K(X) there is a measure
Hong Lu, Klaus Weihrauch
ENTCS
2008
110views more  ENTCS 2008»
13 years 6 months ago
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has b...
Pieter Ceelen, Sjouke Mauw, Sasa Radomirovic
ENTCS
2008
134views more  ENTCS 2008»
13 years 6 months ago
A Stack-Slicing Algorithm for Multi-Core Model Checking
The broad availability of multi-core chips on standard desktop PCs provides strong motivation for the development of new algorithms for logic model checkers that can take advantag...
Gerard J. Holzmann
ENTCS
2008
75views more  ENTCS 2008»
13 years 6 months ago
Vulnerabilities in Anonymous Credential Systems
Raghav Bhaskar, K. Chandrasekaran, Satyanarayana V...