Sciweavers

84 search results - page 5 / 17
» Verifying Security Property of Peer-to-Peer Systems Using CS...
Sort
View
CSFW
2002
IEEE
14 years 13 days ago
Probabilistic Analysis of Anonymity
We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of g...
Vitaly Shmatikov
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
12 years 11 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
NSPW
2004
ACM
14 years 27 days ago
Property-based attestation for computing platforms: caring about properties, not mechanisms
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
Ahmad-Reza Sadeghi, Christian Stüble
SEFM
2005
IEEE
14 years 1 months ago
Formal Analysis of Human-computer Interaction using Model-checking
Experiments with simulators allow psychologists to better understand the causes of human errors and build models of cognitive processes to be used in Human Reliability Assessment ...
Antonio Cerone, Peter A. Lindsay, Simon Connelly
SIGSOFT
2003
ACM
14 years 8 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer