CSFW
14 years 1 months ago
2004 IEEE
We analyze the multi-party contract-signing protocols of Garay and MacKenzie (GM) and of Baum and Waidner (BW). We use a finite-state tool, MOCHA, which allows specification of pr...
CSFW
14 years 1 months ago
2004 IEEE
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
CSFW
14 years 1 months ago
2004 IEEE
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive informat...
CSFW
14 years 1 months ago
2004 IEEE CSFW
14 years 1 months ago
2004 IEEE
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
|