Sciweavers

187 search results - page 17 / 38
» A Semantic Approach to Secure Information Flow
Sort
View
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 7 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
ACSAC
2000
IEEE
14 years 3 days ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
ICITA
2005
IEEE
14 years 1 months ago
Uncovering Attacks on Security Protocols
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
Wuu Yang
DEXAW
2004
IEEE
80views Database» more  DEXAW 2004»
13 years 11 months ago
Traceable Document Flows
Ad-hoc data exchange, e.g., by sending email attachments, leads to multiple copies or versions of a document at dispersed nodes in a network. However, their relationships such as ...
Martin Bernauer, Gerti Kappel, Elke Michlmayr
ITNG
2007
IEEE
14 years 1 months ago
Securing Agent-Oriented Systems: An Argumentation and Reputation-based Approach
In this paper, we propose a new model for securing agent-based systems in which agents are equipped with reasoning capabilities allowing them to interact with each other. The agen...
Jamal Bentahar, John-Jules Ch. Meyer, Bernard Moul...