Sciweavers

1679 search results - page 65 / 336
» Security Properties and CSP
Sort
View
CBSE
2011
Springer
12 years 10 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
OSDI
2004
ACM
14 years 10 months ago
Secure Untrusted Data Repository (SUNDR)
SUNDR is a network file system designed to store data securely on untrusted servers. SUNDR lets clients detect any attempts at unauthorized file modification by malicious server o...
David Mazières, Dennis Shasha, Jinyuan Li, ...
EUC
2007
Springer
14 years 4 months ago
Low-Cost and Strong-Security RFID Authentication Protocol
This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronizati...
JaeCheol Ha, Sang-Jae Moon, Juan Manuel Gonz&aacut...
CSREASAM
2007
13 years 11 months ago
Embedded Processor Security
A preliminary model is introduced in this paper whereby data and its associated security properties are treated as a single atomic unit of information in a hardwareonly context. Se...
Brian J. d'Auriol, Tuyen Nguyen, Vo Quoc Hung, Duc...
ENTCS
2007
120views more  ENTCS 2007»
13 years 10 months ago
Non-Interference Control Synthesis for Security Timed Automata
In this paper, the problem of synthesizing controllers that ensures non interference for multilevel security dense timed discrete event systems modeled by an extension of Timed Au...
Guillaume Gardey, John Mullins, Olivier H. Roux