Sciweavers

5255 search results - page 45 / 1051
» Formal Methods for Privacy
Sort
View
ESORICS
2002
Springer
14 years 9 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
CCS
2005
ACM
14 years 3 months ago
Towards computationally sound symbolic analysis of key exchange protocols
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Prateek Gupta, Vitaly Shmatikov
SAFECOMP
1998
Springer
14 years 1 months ago
Safety Verification of Software Using Structured Petri Nets
A method is described for the analysis and the verification of safety in software systems. The method offers a formal notation for describing the software structure, the means for ...
Krzysztof Sacha
ICISS
2010
Springer
13 years 8 months ago
A Practical Generic Privacy Language
Abstract. We present a declarative language with a formal semantics for specifying both users' privacy preferences and services' privacy policies. Expressiveness and appl...
Moritz Y. Becker, Alexander Malkis, Laurent Bussar...
ZUM
1992
Springer
14 years 2 months ago
An International Survey of Industrial Applications of Formal Methods
Dan Craigen, Susan L. Gerhart, Ted Ralston