Sciweavers

1490 search results - page 246 / 298
» The Logic of Authentication Protocols
Sort
View
FSTTCS
2004
Springer
14 years 2 months ago
A Calculus for Trust Management
We introduce ctm, a process calculus which embodies a notion of trust for global computing systems. In ctm each principal (location) is equipped with a policy, which determines its...
Marco Carbone, Mogens Nielsen, Vladimiro Sassone
IFIP
2004
Springer
14 years 2 months ago
Decidability of Opacity with Non-Atomic Keys
The most studied property, secrecy, is not always sufficient to prove the security of a protocol. Other properties such as anonymity, privacy or opacity could be useful. Here, we u...
Laurent Mazaré
ASYNC
2003
IEEE
97views Hardware» more  ASYNC 2003»
14 years 2 months ago
Energy and Performance Models for Clocked and Asynchronous Communication
Parameterized first-order models for throughput, energy, and bandwidth are presented in this paper. Models are developed for many common pipeline methodologies, including clocked...
Kenneth S. Stevens
HASE
1998
IEEE
14 years 1 months ago
A Firewalling Scheme for Securing MPOA-Based Enterprise Networks
A well-known security problem with MPOA is that cutthrough connections generally bypasses firewall routers if there are any. None of the previously proposed approaches solved the ...
Jun Xu, Mukesh Singhal
INFOCOM
1998
IEEE
14 years 1 months ago
A Scalable Control Topology for Multicast Communications
Large-Scale multicast applications for the Internet require the availability of multicast protocols that enhance the basic connectionless IP Multicast service. A critical requirem...
Jörg Liebeherr, Bhupinder Singh Sethi