Sciweavers

2043 search results - page 4 / 409
» Reasoning About Security Models
Sort
View
IFIP
2004
Springer
14 years 3 months ago
Reasoning about Secure Interoperation Using Soft Constraints
Abstract The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for sy...
Stefano Bistarelli, Simon N. Foley, Barry O'Sulliv...
IEEESP
2011
13 years 1 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
CONCUR
2001
Springer
14 years 2 months ago
Reasoning about Security in Mobile Ambients
The paper gives an assessment of security for Mobile Ambients, with specific focus on mandatory access control (MAC) policies in multilevel security systems. The first part of th...
Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
CSFW
2007
IEEE
14 years 4 months ago
Reasoning about Concurrency for Security Tunnels
There has been excellent progress on languages for rigorously describing key exchange protocols and techniques for proving that the network security tunnels they establish preserv...
Alwyn Goodloe, Carl A. Gunter
ENTCS
2007
97views more  ENTCS 2007»
13 years 9 months ago
A Process Algebra for Reasoning About Quantum Security
Pedro Adão, Paulo Mateus