Sciweavers

1679 search results - page 63 / 336
» Security Properties and CSP
Sort
View
IFIP
2009
Springer
14 years 4 months ago
Specifying and Modelling Secure Channels in Strand Spaces
We adapt the Strand Spaces model to reason abstractly about layered security protocols, where an Application Layer protocol ed on top of a secure transport protocol. The model abst...
Allaa Kamil, Gavin Lowe
IEEEIAS
2007
IEEE
14 years 4 months ago
Modeling Security Protocols as Games
We model security protocols as a game tree using concepts of game semantics. The model interprets protocol specifications as strategies over a game tree that represents the type ...
Mohamed Saleh, Mourad Debbabi
SCS
2003
13 years 11 months ago
Security as a Safety Issue in Rail Communications
Systems whose failure can lead to the damage of property or the environment, or loss of human life are regarded as safety-critical systems. It is no longer adequate to build safet...
Jason Smith, Selwyn Russell, Mark Looi
CN
1999
88views more  CN 1999»
13 years 9 months ago
Building a high-performance, programmable secure coprocessor
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can Z .execute and accumulate state , free of observation and inte...
Sean W. Smith, Steve Weingart
IEEEARES
2007
IEEE
14 years 4 months ago
Pastures: Towards Usable Security Policy Engineering
Whether a particular computing installation meets its security goals depends on whether the administrators can create a policy that expresses these goals—security in practice re...
Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W...