Sciweavers

2043 search results - page 36 / 409
» Reasoning About Security Models
Sort
View
JURIX
2008
13 years 11 months ago
About the logical relations between cases and rules
The two main types of law are legislation and precedents. Both types have a corresponding reasoning pattern determining legal consequences: legislation can be applied and precedent...
Bart Verheij
CSFW
2009
IEEE
14 years 5 months ago
ASPIER: An Automated Framework for Verifying Security Protocol Implementations
Abstract. We present aspier – the first framework that combines software model checking with a standard protocol security model to analyze authentication and secrecy properties ...
Sagar Chaki, Anupam Datta
DSN
2003
IEEE
14 years 3 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
ICDE
2009
IEEE
1081views Database» more  ICDE 2009»
15 years 10 months ago
Modeling and Integrating Background Knowledge in Data Anonymization
Recent work has shown the importance of considering the adversary’s background knowledge when reasoning about privacy in data publishing. However, it is very difficult for the d...
Tiancheng Li, Ninghui Li, Jian Zhang
TYPES
2004
Springer
14 years 3 months ago
A Machine-Checked Formalization of the Random Oracle Model
Abstract. Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowl...
Gilles Barthe, Sabrina Tarento