Sciweavers

360 search results - page 5 / 72
» ccs 2008
Sort
View
CCS
2008
ACM
14 years 26 days ago
Verified implementations of the information card federated identity-management protocol
We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card
Karthikeyan Bhargavan, Cédric Fournet, Andr...
ENTCS
2008
74views more  ENTCS 2008»
13 years 11 months ago
Matching Systems for Concurrent Calculi
Matching systems were introduced by Carbone and Maffeis, and used to investigate the expressiveness of the pi-calculus with polyadic synchronisation. We adapt their definition and...
Bjørn Haagensen, Sergio Maffeis, Iain Phill...
CCS
2008
ACM
14 years 26 days ago
Cryptographically verified implementations for TLS
We intend to narrow the gap between concrete implementations of cryptographic protocols and their verified models. We develop and verify a small functional implementation of the T...
Karthikeyan Bhargavan, Cédric Fournet, Rica...
CCS
2008
ACM
14 years 26 days ago
Mechanisms for usage control
Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce ...
Alexander Pretschner, Manuel Hilty, David A. Basin...