Sciweavers

CSFW
2008
IEEE
14 years 7 months ago
Language Based Secure Communication
Secure communication in distributed systems is notoriously hard to achieve due to the variety of attacks an adversary can mount, based on message interception, modification, redi...
Michele Bugliesi, Riccardo Focardi
CSFW
2008
IEEE
14 years 7 months ago
Refinement Types for Secure Implementations
Jesper Bengtson, Karthikeyan Bhargavan, Céd...
CSFW
2008
IEEE
14 years 7 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
CSFW
2008
IEEE
14 years 7 months ago
Composition of Password-Based Protocols
We investigate the composition of protocols that share a common secret. This situation arises when users employ the same password on different services. More precisely we study w...
Stéphanie Delaune, Steve Kremer, Mark Ryan
CSFW
2008
IEEE
14 years 7 months ago
DKAL: Distributed-Knowledge Authorization Language
DKAL is a new declarative authorization language for distributed systems. It is based on existential fixed-point logic and is considerably more expressive than existing authoriza...
Yuri Gurevich, Itay Neeman
CSFW
2008
IEEE
14 years 7 months ago
Security Decision-Making among Interdependent Organizations
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the s...
Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell...
CSFW
2008
IEEE
14 years 7 months ago
Tractable Enforcement of Declassification Policies
Gilles Barthe, Salvador Cavadini, Tamara Rezk
CSFW
2008
IEEE
14 years 7 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal