Sciweavers

1235 search results - page 15 / 247
» Formalizing information security knowledge
Sort
View
CCS
2005
ACM
15 years 8 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
SIN
2009
ACM
15 years 9 months ago
An information security ontology incorporating human-behavioural implications
Security managers often regard human behaviour as a security liability, but they should accommodate it within their organisation’s information security management procedures. To...
Simon Edward Parkin, Aad P. A. van Moorsel, Robert...
ECIS
2000
15 years 3 months ago
Reclaiming Knowledge: A Case for Evidence-Based Information Systems
: Both the information base, on which IS research and practice is founded, and its accessibility continue to grow rapidly. A major challenge facing the IS community in the next dec...
Clare Atkins, Gail Louw
141
Voted
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
15 years 28 days ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
LICS
2007
IEEE
15 years 8 months ago
A Complete Axiomatization of Knowledge and Cryptography
The combination of first-order epistemic logic and formal cryptography offers a potentially very powerful framework for security protocol verification. In this article, we addre...
Mika Cohen, Mads Dam