Sciweavers

1679 search results - page 34 / 336
» Security Properties and CSP
Sort
View
ZUM
2000
Springer
13 years 11 months ago
Formal Methods for Industrial Products
We have recently completed the specication and security proof of a large, industrial scale application. The application is security critical, and the modelling and proof were done ...
Susan Stepney, David Cooper
CSFW
2004
IEEE
13 years 11 months ago
Modelling Downgrading in Information Flow Security
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
ASIAN
2007
Springer
76views Algorithms» more  ASIAN 2007»
13 years 11 months ago
Secure Verification of Location Claims with Simultaneous Distance Modification
We investigate the problem of verifying location claims of mobile devices, and propose a new property called simultaneous distance modification (SDM). In localization protocols sat...
Vitaly Shmatikov, Ming-Hsiu Wang
IPCCC
2006
IEEE
14 years 1 months ago
Energy-efficient cooperative routing in multi-hop wireless ad hoc networks
We study the routing problem for multi-hop wireless ad hoc networks based on cooperative transmission. We prove that the Minimum Energy Cooperative Path (MECP) routing problem, i....
Fulu Li, Kui Wu, Andrew Lippman
CCGRID
2010
IEEE
13 years 8 months ago
Dynamic Auction Mechanism for Cloud Resource Allocation
We propose a dynamic auction mechanism to solve the allocation problem of computation capacity in the environment of cloud computing. Truth-telling property holds when we apply a s...
Wei-Yu Lin, Guan-Yu Lin, Hung-Yu Wei