Sciweavers

178 search results - page 26 / 36
» Dependability Arguments with Trusted Bases
Sort
View
WPES
2003
ACM
14 years 20 days ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
DEON
2008
Springer
13 years 9 months ago
Delegation of Control in Administrative Procedures
Abstract. Norms are implemented by administrative procedures. This paper addresses the delegation of control in administrative procedures. Instead of having to check all details, a...
Joris Hulstijn, Jianwei Liu, Yao-Hua Tan
AOSD
2007
ACM
13 years 11 months ago
Tribe: a simple virtual class calculus
Beginning with BETA, a range of programming language mechanisms such as virtual classes (class-valued attributes of objects) have been developed to allow inheritance in the presen...
Dave Clarke, Sophia Drossopoulou, James Noble, Tob...
ESEC
1999
Springer
13 years 11 months ago
FACADE: A Typed Intermediate Language Dedicated to Smart Cards
The use of smart cards to run software modules on demand has become a major business concern for application issuers. Such downloadable executable content requires to be trusted by...
Gilles Grimaud, Jean-Louis Lanet, Jean-Jacques Van...
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
14 years 19 days ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor