Sciweavers

360 search results - page 5 / 72
» ccs 2008
Sort
View
105
Voted
CCS
2008
ACM
15 years 2 months ago
Adaptive distributed mechanism against flooding network attacks based on machine learning
Josep Lluis Berral, Nicolás Poggi, Javier A...
CCS
2008
ACM
15 years 2 months ago
Verified implementations of the information card federated identity-management protocol
We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card
Karthikeyan Bhargavan, Cédric Fournet, Andr...
84
Voted
ENTCS
2008
74views more  ENTCS 2008»
15 years 22 days ago
Matching Systems for Concurrent Calculi
Matching systems were introduced by Carbone and Maffeis, and used to investigate the expressiveness of the pi-calculus with polyadic synchronisation. We adapt their definition and...
Bjørn Haagensen, Sergio Maffeis, Iain Phill...
71
Voted
CCS
2008
ACM
15 years 2 months ago
Cryptographically verified implementations for TLS
We intend to narrow the gap between concrete implementations of cryptographic protocols and their verified models. We develop and verify a small functional implementation of the T...
Karthikeyan Bhargavan, Cédric Fournet, Rica...
CCS
2008
ACM
15 years 2 months ago
Mechanisms for usage control
Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce ...
Alexander Pretschner, Manuel Hilty, David A. Basin...