Sciweavers

ESORICS
2008
Springer
14 years 1 months ago
Code-Carrying Authorization
In authorization, there is often a wish to shift the burden of proof to those making requests, since they may have more resources and more specific knowledge to construct the requi...
Sergio Maffeis, Martín Abadi, Cédric...
CSFW
2008
IEEE
14 years 1 months ago
A Correctness Proof of a Mesh Security Architecture
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a ...
Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve ...
CSFW
2008
IEEE
14 years 1 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
CSFW
2008
IEEE
14 years 1 months ago
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
Michael Backes, Catalin Hritcu, Matteo Maffei
CRITIS
2008
14 years 1 months ago
Emerging Information Infrastructures: Cooperation in Disasters
Mikael Asplund, Simin Nadjm-Tehrani, Johan Sigholm
CRITIS
2008
14 years 1 months ago
Testbeds for Assessing Critical Scenarios in Power Control Systems
Abstract. The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility Infrastructur...
Giovanna Dondossola, Geert Deconinck, Fabrizio Gar...