Sciweavers

2043 search results - page 42 / 409
» Reasoning About Security Models
Sort
View
PLDI
2006
ACM
14 years 4 months ago
Combining type-based analysis and model checking for finding counterexamples against non-interference
Type systems for secure information flow are useful for efficiently checking that programs have secure information flow. They are, however, conservative, so that they often rej...
Hiroshi Unno, Naoki Kobayashi, Akinori Yonezawa
WORM
2003
13 years 11 months ago
Worm anatomy and model
We present a general framework for reasoning about network worms and analyzing the potency of worms within a specific network. First, we present a discussion of the life cycle of ...
Dan Ellis
CONTEXT
1999
Springer
14 years 2 months ago
Counterfactual Reasoning by Means of a Calculus of Narrative Context
Abstract. The basic Event Calculus is extended by a Calculus of Narrative Context, to allow for reasoning about counterfactuals. Different hypothetical courses of events are disti...
Rolf Nossum, Michael Thielscher
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot
COMPSAC
2003
IEEE
14 years 3 months ago
A Security Characterisation Framework for Trustworthy Component Based Software Systems
This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framewo...
Khaled M. Khan, Jun Han