Sciweavers

206 search results - page 21 / 42
» A Logic of Privacy
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
EIS
2011
253views ECommerce» more  EIS 2011»
13 years 2 months ago
A modelling and reasoning framework for social networks policies
Policy languages (such as privacy and rights) have had little impact on the wider community. Now that Social Networks have taken off, the need to revisit Policy languages and real...
Guido Governatori, Renato Iannella
ACSAC
1999
IEEE
13 years 12 months ago
Security Architecture Development and Results for a Distributed Modeling and Simulation System
This paper reports on an ongoing effort to define the security architecture for the Joint Simulation System (JSIMS), a joint military modeling and simulation system. It also descr...
Richard B. Neely
IEEEARES
2008
IEEE
14 years 2 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...
IEEEARES
2008
IEEE
14 years 2 months ago
Application-Oriented Trust in Distributed Computing
Preserving integrity of applications being executed in remote machines is an open problem. Integrity requires that application code is not tampered with, prior to or during execut...
Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, ...