Sciweavers

1235 search results - page 121 / 247
» Formalizing information security knowledge
Sort
View
PLDI
2006
ACM
14 years 1 months ago
Combining type-based analysis and model checking for finding counterexamples against non-interference
Type systems for secure information flow are useful for efficiently checking that programs have secure information flow. They are, however, conservative, so that they often rej...
Hiroshi Unno, Naoki Kobayashi, Akinori Yonezawa
PKC
2010
Springer
187views Cryptology» more  PKC 2010»
13 years 10 months ago
Confidential Signatures and Deterministic Signcryption
Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...
SEW
2005
IEEE
14 years 1 months ago
A Generative Style-driven Framework for Software Architecture Design
Compared with texts, graphs are more intuitive to express comparative and structural information. Many graphical approaches, however, lack a formal basis for precise specification...
Jun Kong, Kang Zhang, Jing Dong, Guang-Lei Song
MKM
2005
Springer
14 years 1 months ago
A Proof-Theoretic Approach to Hierarchical Math Library Organization
Abstract. The relationship between theorems and lemmas in mathematical reasoning is often vague. No system exists that formalizes the structure of theorems in a mathematical librar...
Kamal Aboul-Hosn, Terese Andersen
COLING
1990
13 years 9 months ago
The General Architecture of Generation in ACORD
This paper describes the general architecture of generation in the ACORDproject. The central module of this architecture is a planning component, which allows to plan single sente...
Dieter Kohl, Agnès Plainfossé, Clair...