Sciweavers

CSFW
1995
IEEE
14 years 3 months ago
Composing and decomposing systems under security properties
We investigate the formal relationship between separability of processes and the types of non-interference properties they enjoy. Though intuitively appealing, separability – th...
A. W. Roscoe, L. Wulf
CSFW
1995
IEEE
14 years 3 months ago
Modelling and verifying key-exchange protocols using CSP and FDR
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model-checking tool FDR. Expressing such protocols within a pr...
A. W. Roscoe
CSFW
1995
IEEE
14 years 3 months ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
SPW
2000
Springer
14 years 3 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
SPW
2000
Springer
14 years 3 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
SPW
2000
Springer
14 years 3 months ago
Making Sense of Specifications: The Formalization of SET
Giampaolo Bella, Fabio Massacci, Lawrence C. Pauls...
SP
2000
IEEE
14 years 3 months ago
A More Efficient Use of Delta-CRLs
Delta-certificate revocation lists (delta-CRLs) were designed to provide a more efficient way to distribute certificate status information. However, as this paper shows, in some e...
David A. Cooper
SP
2000
IEEE
14 years 3 months ago
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspec...
John A. Clark, Jeremy L. Jacob