Sciweavers

436 search results - page 47 / 88
» A secure execution framework for Java
Sort
View
IWFM
2000
167views Formal Methods» more  IWFM 2000»
13 years 9 months ago
An Algebraic Basis for Specifying and Enforcing Access Control in Security Systems
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
Claus Pahl
DAGSTUHL
2003
13 years 10 months ago
Operational Semantics of Security Protocols
Based on a concise domain analysis we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e...
Cas J. F. Cremers, Sjouke Mauw
NOMS
2000
IEEE
101views Communications» more  NOMS 2000»
14 years 27 days ago
Using mobile agents for network performance management
Mobile agent frameworks have attracted a lot of attention in recent years, seen as counterparts of static distributed object frameworks but allowing also for object or agent mobil...
Christos Bohoris, George Pavlou, Haitham S. Cruick...
EMSOFT
2004
Springer
14 years 1 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
EUROCRYPT
2007
Springer
14 years 2 months ago
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Protocols proven secure within the universal composability (UC) framework satisfy strong and desirable security properties. Unfortunately, it is known that within the “plain” m...
Jonathan Katz