Sciweavers

1833 search results - page 14 / 367
» Mechanized Verification with Sharing
Sort
View

Lecture Notes
564views
15 years 10 months ago
Classic Mechanism Design
Survey Chapters on Mechanism Design and Electronic Markets, Shared by David Parkes
David Parkes
FMCAD
2008
Springer
14 years 13 days ago
Mechanized Information Flow Analysis through Inductive Assertions
We present a method for verifying information flow properties of software programs using inductive assertions and theorem proving. Given a program annotated with information flow a...
Warren A. Hunt Jr., Robert Bellarmine Krug, Sandip...
CCS
2008
ACM
14 years 27 days ago
Mechanisms for usage control
Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce ...
Alexander Pretschner, Manuel Hilty, David A. Basin...
APSCC
2006
IEEE
14 years 26 days ago
GHIDS: Defending Computational Grids against Misusing of Shared Resources
Detecting intrusions at host level is vital to protecting shared resources in grid, but traditional Host-based Intrusion Detecting System (HIDS) is not suitable for grid environme...
Guofu Feng, Xiaoshe Dong, Weizhe Liu, Ying Chu, Ju...
ICISC
2004
147views Cryptology» more  ICISC 2004»
14 years 8 days ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim