Sciweavers

28 search results - page 4 / 6
» Specifying and Modelling Secure Channels in Strand Spaces
Sort
View
ICC
2008
IEEE
142views Communications» more  ICC 2008»
14 years 2 months ago
A Comprehensive Analytical Model for IEEE 802.11e QoS Differentiation Schemes under Unsaturated Traffic Loads
Arbitrary Inter-frame Space (AIFS), Contention Window (CW) and Transmission Opportunity (TXOP) are three important Quality-of-Service (QoS) differentiation schemes specified in the...
Jia Hu, Geyong Min, Michael E. Woodward, Weijia Ji...
SIGADA
2004
Springer
14 years 29 days ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
WETICE
2005
IEEE
14 years 1 months ago
Application of Lightweight Formal Methods to Software Security
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...
David P. Gilliam, John D. Powell, Matt Bishop
HPDC
1996
IEEE
13 years 11 months ago
The Core Legion Object Model
This document describes the core Legion object model. The model specifies the composition and functionality of Legion's core objects--those objects that cooperate to create, ...
Michael J. Lewis, Andrew S. Grimshaw
CCS
2011
ACM
12 years 7 months ago
Trace equivalence decision: negative tests and non-determinism
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...