Sciweavers

615 search results - page 33 / 123
» Frameworks for Securing Limited-Device Applications
Sort
View
JOC
2011
157views more  JOC 2011»
13 years 3 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
ESORICS
2002
Springer
14 years 8 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz
ISCC
2000
IEEE
14 years 1 months ago
IsoWAN: A NASA Science and Engineering Information and Services Framework
We believe that the next evolutionary step in supporting wide-area application and services delivery to customers is a network framework that provides for collocation of applicati...
David J. Korsmeyer, Edward T. Chow, Michael P. Con...
SP
2010
IEEE
222views Security Privacy» more  SP 2010»
14 years 16 days ago
A Symbolic Execution Framework for JavaScript
—As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In ...
Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng...
SAINT
2008
IEEE
14 years 3 months ago
A Sybil-Resilient Reputation Metric for P2P Applications
In this paper, we propose a reputation-based trust model for P2P applications and study it a security framework. This framework makes it easy to reason about the resilience of the...
Tien Tuan Anh Dinh, Mark Ryan