Secure group communication protocols have been designed to meet needs such as secure management of group membership, confidential group communication, and access control. New lan...
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
Abstract. While a rigorous information flow analysis is a key step in obtaining meaningful end-to-end confidentiality guarantees, one must also permit possibilities for declassific...
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...