Sciweavers

1235 search results - page 60 / 247
» Formalizing information security knowledge
Sort
View
IFIP
2009
Springer
14 years 2 months ago
Analysing the Information Flow Properties of Object-Capability Patterns
We consider the problem of detecting covert channels within security-enforcing object-capability patterns. Traditional formalisms for reasoning about the security properties of obj...
Toby C. Murray, Gavin Lowe
CCS
2005
ACM
14 years 1 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
LOPSTR
2001
Springer
14 years 17 days ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle
ICRA
2007
IEEE
126views Robotics» more  ICRA 2007»
14 years 2 months ago
Semantic Knowledge-Based Execution Monitoring for Mobile Robots
Abstract— We describe a novel intelligent execution monitoring approach for mobile robots acting in indoor environments such as offices and houses. Traditionally, monitoring exe...
Abdelbaki Bouguerra, Lars Karlsson, Alessandro Saf...
ASIAN
2009
Springer
334views Algorithms» more  ASIAN 2009»
13 years 9 months ago
A Dolev-Yao Model for Zero Knowledge
In cryptographic protocols, zero knowledge proofs are employed for a principal A to communicate some non-trivial information t to B while at the same time ensuring that B cannot de...
Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh