Sciweavers

1779 search results - page 98 / 356
» A Formal Model of Data Privacy
Sort
View
ACSAC
2001
IEEE
15 years 7 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
CSFW
2008
IEEE
15 years 6 months ago
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
Michael Backes, Catalin Hritcu, Matteo Maffei
CSFW
2004
IEEE
15 years 7 months ago
From Stack Inspection to Access Control: A Security Analysis for Libraries
We present a new static analysis for reviewing the security of libraries for systems, such as JVMs or the CLR, that rely on stack inspection for access control. We describe its im...
Frédéric Besson, Tomasz Blanc, C&eac...
SAFECOMP
2010
Springer
15 years 2 months ago
Deriving Safety Cases for Hierarchical Structure in Model-Based Development
Abstract. Model-based development and automated code generation are increasingly used for actual production code, in particular in mathematical and engineering domains. However, si...
Nurlida Basir, Ewen Denney, Bernd Fischer 0002
131
Voted
DLOG
2003
15 years 5 months ago
Relationships with other Formalisms
In this chapter, we are concerned with the relationship between Description Logics and other formalisms, regardless of whether they were designed for knowledge representation issu...
Ulrike Sattler, Diego Calvanese, Ralf Molitor