Sciweavers

IFIP
2009
Springer
14 years 4 months ago
A Practice-Based Analysis of an Online Strategy Game
Giannis Milolidakis, Chris Kimble, Demosthenes Ako...
IFIP
2009
Springer
14 years 4 months ago
Secure Information Flow for Distributed Systems
We present an abstract language for distributed systems of processes with local memory and private communication channels. Communication between processes is done via messaging. Th...
Rafael Alpízar, Geoffrey Smith
IFIP
2009
Springer
14 years 4 months ago
Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties
Pascal Lafourcade, Vanessa Terrade, Sylvain Vigier
IFIP
2009
Springer
14 years 4 months ago
An Algebra for Trust Dilution and Trust Fusion
Trust dilution and trust fusion are two operators that are used to calculate transitive trust in a trust network. Various implementations of these operators already exist but are n...
Baptiste Alcalde, Sjouke Mauw
IFIP
2009
Springer
14 years 6 months ago
A Calculus of Trustworthy Ad Hoc Networks
We propose a process calculus for mobile ad hoc networks which embodies a behaviour-based multilevel decentralised trust model. Our trust model supports both direct trust, by monit...
Massimo Merro, Eleonora Sibilio
IFIP
2009
Springer
14 years 6 months ago
HMM-Based Trust Model
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either a...
Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielse...
IFIP
2009
Springer
14 years 6 months ago
Integrating Automated and Interactive Protocol Verification
Achim D. Brucker, Sebastian Mödersheim
IFIP
2009
Springer
14 years 6 months ago
Applied Quantitative Information Flow and Statistical Databases
We firstly describe an algebraic structure which serves as solid basis to quantitatively reason about information flows. We demonstrate how programs in form of partition of state...
Jonathan Heusser, Pasquale Malacaria
IFIP
2009
Springer
14 years 6 months ago
Analysing the Information Flow Properties of Object-Capability Patterns
We consider the problem of detecting covert channels within security-enforcing object-capability patterns. Traditional formalisms for reasoning about the security properties of obj...
Toby C. Murray, Gavin Lowe