Sciweavers

56 search results - page 9 / 12
» Cryptographically verified implementations for TLS
Sort
View
FMCO
2003
Springer
121views Formal Methods» more  FMCO 2003»
14 years 19 days ago
TulaFale: A Security Tool for Web Services
Web services security specifications are typically expressed as a mixture of XML schemas, example messages, and narrative explanations. We propose a new specification language fo...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
14 years 1 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speci...
Anooshiravan Saboori, Christoforos N. Hadjicostis
DSN
2005
IEEE
14 years 1 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
ASIAN
2003
Springer
115views Algorithms» more  ASIAN 2003»
14 years 19 days ago
Bankable Postage for Network Services
We describe a new network service, the “ticket server”. This service provides “tickets” that a client can attach to a request for a network service (such as sending email o...
Martín Abadi, Andrew Birrell, Michael Burro...
PODC
2010
ACM
13 years 11 months ago
Brief announcement: anonymity and trust in distributed systems
In this paper, we present a framework for achieving anonymity and trust, two seemingly contradictory properties, in distributed systems. Our approach builds on webs of trust, a we...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...