Sciweavers

300 search results - page 39 / 60
» Formal Methods for Smartcard Security
Sort
View
124
Voted
CCS
2005
ACM
15 years 8 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
126
Voted
IEEEAMS
2003
IEEE
15 years 8 months ago
Building Autonomic Systems Via Configuration
Large classes of autonomic (self-managing, selfhealing) systems can be created by logically integrating simpler autonomic systems. The configuration method is widely used for such...
Sanjai Narain, Thanh Cheng, Brian A. Coan, Vikram ...
69
Voted
SIGSOFT
2003
ACM
16 years 3 months ago
Policy-enforced linking of untrusted components
d Abstract) Eunyoung Lee Andrew W. Appel Department of Computer Science Princeton University {elee,appel}@cs.princeton.edu Categories and Subject Descriptors D.2.4 [Software Engine...
Eunyoung Lee, Andrew W. Appel
105
Voted
TAP
2009
Springer
125views Hardware» more  TAP 2009»
15 years 9 months ago
Development of a Generic Voter under FoCal
Safety and security are claimed major concerns by the formal FoCaL development environment. In [7] we introduced a safety development cycle customised to FoCaL. In this paper, we e...
Philippe Ayrault, Thérèse Hardin, Fr...
139
Voted
ACL2
2006
ACM
15 years 8 months ago
An embedding of the ACL2 logic in HOL
We describe an embedding of the ACL2 logic into higherorder logic. An implementation of this embedding allows ACL2 to be used as an oracle for higher-order logic provers. Categori...
Michael J. C. Gordon, Warren A. Hunt Jr., Matt Kau...