Sciweavers

718 search results - page 104 / 144
» Operational Semantics of Security Protocols
Sort
View
IDTRUST
2010
ACM
14 years 2 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
ISI
2007
Springer
14 years 2 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
13 years 12 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
ESORICS
2010
Springer
13 years 9 months ago
A Theory of Runtime Enforcement, with Results
This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and...
Jay Ligatti, Srikar Reddy
ICFP
2008
ACM
14 years 8 months ago
Typed closure conversion preserves observational equivalence
Language-based security relies on the assumption that all potential attacks are bound by the rules of the language in question. When programs are compiled into a different languag...
Amal Ahmed, Matthias Blume