Sciweavers

578 search results - page 40 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
CSFW
2005
IEEE
14 years 2 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
ICLP
2009
Springer
14 years 9 months ago
Reducts of Propositional Theories, Satisfiability Relations, and Generalizations of Semantics of Logic Programs
Over the years, the stable-model semantics has gained a position of the correct (two-valued) interpretation of default negation in programs. However, for programs with aggregates (...
Miroslaw Truszczynski
CSFW
2010
IEEE
14 years 3 days ago
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs
We embed an operational semantics for security protocols in the interactive theorem prover Isabelle/HOL and derive two strong protocol-independent invariants. These invariants allo...
Simon Meier, Cas J. F. Cremers, David A. Basin
SPW
1999
Springer
14 years 1 months ago
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues f...
Frank Stajano, Ross J. Anderson
CCS
2003
ACM
14 years 2 months ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce