Sciweavers

653 search results - page 35 / 131
» A Logic of Secure Systems and its Application to Trusted Com...
Sort
View
CCS
2005
ACM
14 years 1 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
ATVA
2006
Springer
106views Hardware» more  ATVA 2006»
13 years 11 months ago
Efficient Algorithms for Alternating Pushdown Systems with an Application to the Computation of Certificate Chains
Motivated by recent applications of pushdown systems to computer security problems, we present an efficient algorithm for the reachability problem of alternating pushdown systems. ...
Dejvuth Suwimonteerabuth, Stefan Schwoon, Javier E...
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
14 years 8 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
DASC
2006
IEEE
14 years 1 months ago
DRBTS: Distributed Reputation-based Beacon Trust System
Abstract— Wireless Sensor Networks (WSNs) have critical applications in diverse domains like environmental monitoring and military operations where accurate location of sensors i...
Avinash Srinivasan, Joshua Teitelbaum, Jie Wu
ICTAC
2005
Springer
14 years 1 months ago
A Rewriting Logic Sampler
Rewriting logic is a simple computational logic very well suited as a semantic framework within which many different models of computation, systems and languages can be naturally ...
José Meseguer