Sciweavers

232 search results - page 12 / 47
» Verifying persistent security properties
Sort
View
JCS
2011
74views more  JCS 2011»
13 years 3 months ago
Model-checking trace-based information flow properties
In this paper we consider the problem of verifying trace-based information flow properties for different classes of system models. We begin by proposing an automata-theoretic te...
Deepak D'Souza, Raveendra Holla, K. R. Raghavendra...
CSFW
2002
IEEE
14 years 1 months ago
Probabilistic Analysis of Anonymity
We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of g...
Vitaly Shmatikov
FSEN
2007
Springer
14 years 2 months ago
Is Your Security Protocol on Time ?
Abstract. In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a s...
Gizela Jakubowska, Wojciech Penczek
ACSAC
2008
IEEE
13 years 10 months ago
Assessing Quality of Policy Properties in Verification of Access Control Policies
Access control policies are often specified in declarative languages. In this paper, we propose a novel approach, called mutation verification, to assess the quality of properties...
Evan Martin, JeeHyun Hwang, Tao Xie, Vincent C. Hu
EWSA
2004
Springer
14 years 2 months ago
ArchWare: Architecting Evolvable Software
This paper gives an overview of the ArchWare European Project1 . The broad scope of ArchWare is to respond to the ever-present demand for software systems that are capable of accom...
Flávio Oquendo, Brian Warboys, Ronald Morri...